Comment on DNS Attack Takes Down Google Morocco by HF Export
It is hard to know what it takes to protect a server attacks … Here we speak of DNS attacks, but there are so many other … In any case when addressing Google does not last long, the servers have the...
View ArticleComment on Security B-Sides Vegas 2011 Review: How to Hide Your Pr0n by Josh...
Thanks for the write-up on our talk at BSidesLV. I have very similar issues with the governments abuse of power and that was one of the reasons why we wrote Stegg0 to begin with. At the end of your...
View ArticleComment on Web Hacking Survival Kit (News Sources) by Chook
Nice site, and lots of info that will keep me reading for hours
View ArticleComment on Surviving the Week 6/8/2012 by Port80 Software
It’s good to see someone mentioning that users not only change their LinkedIn password, but also change it for any account that uses the same password, or even a similar password. It’s also important...
View ArticleComment on The Sierra Network (ImagiNation) – Lives again by J.R. Holland
Dan – Do you still play on Inn Revival? I just downloaded the client from your blog and am interested in knowing if anyone is still playing. I’m doubting it, but who knows?!? Send me an e-mail at the...
View ArticleComment on Web Hacking Survival Kit (Pentesting Tools) by mbati
Would like an online training on ethical hacking
View ArticleComment on The Sierra Network (ImagiNation) – Lives again by M Flynn
Hi I just started playing this and am just having a blast. I used to play this way back when and even was a beta tester.
View ArticleComment on OWASP Top 10 List Maturing – Evidenced by Minor Changes by Jessica...
” Developers have long used shared libraries and open source code, and oftentimes these components have vulnerabilities that affect the software built with them.” I’m glad this is on the list as well....
View ArticleComment on Four Reasons Security Teams Can’t Stop SQL Injection...
“They simply don’t have the staff, time or technology to dedicate to fixing every vulnerability.” Great point. Sometimes teams have to make decisions and categorize vulnerabilities because they just...
View ArticleComment on WAF != Firewall by Alejandro
Hi Dan, very informative article you made here. You earned a new follower. Cheers!
View ArticleComment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...
Thanks for the post ☺ Yeah, web honeypots is an interesting topic and a lot of work to be done! We plan to release our project soon. Will keep you posted! Sincerely, SRF
View ArticleComment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...
Great! Looking forward to hearing your updates.
View ArticleComment on Chinese Corporate Cyber Espionage by Christopher R. Lew Ph.D by...
The most likely reasons for a possible US vs China war could be a US invasion of North Korea or an escalation of the Taiwan dispute. A war of such nature would be fought in the Pacific, which would be...
View ArticleComment on Are You Ready for Some (Fantasy) Football? by jhaddix
sad i missed out on such an epic sounding league!
View ArticleComment on HOFFL 2014 Playoffs Week 2 by alan shimel
OK Dan I have made some last minute roster pickups like a championship manager should. I wish you luck but am feeling really good about my chances. My team has been practicing well all week 😉 Speak to...
View ArticleComment on Dev by mita
hi, Podpress doesnt work anymore on my updated wordpress. Cant load new podcasts and also cant create other posts/pages without deactivating podpress. What to do pls? Any other suggestions for podcast...
View ArticleComment on An Information Security Place Podcast – Episode 01 for 2012 –...
Thanks for your note about building surceity into the product. Too often surceity is thought of too late in the development process.Your final point about track them till closure – just because the...
View ArticleComment on PHP Security and the Month of PHP Bugs by Dimas
A couple of notes, sainzite your request variables before pulling data directing into you code. Avoid using double quote for simple string echo as it is extra load on php parsing use single quote...
View ArticleComment on WAF != Firewall by Jean
Thanks, Dan. I drew the conclusion bcseuae of where I found the report was hosted; can you elaborate on any relationship other than employer-employee with NT OBJECTives and Larry?
View ArticleComment on WAF != Firewall by marcus apostos
Far better article here: https://www.sans.org/security-resources/idfaq/ips-web-app-firewall.php
View ArticleComment on Man vs WebApp Podcast – Episode 01 – Welcome To The Show by Jess...
Linter – you’re thinking of a linter… code correctness tool… the competitor to Metasploit is Core Impact… I’ve been doing this for over about 8 years now… before that, 20 years in software development
View ArticleComment on This Blog lives again! by lauMarot
nice to read ! You should also migrate your Twitter button wich still leads to NTObjectives
View ArticleComment on This Blog lives again! by ajay
Really learnt few things from this blog, Nice to see coming back again, please have more articles on testing web services . Good luck, Thanks,Aj
View Article