Vlan Hopping

Vlan Hopping

Introduction to VLAN Virtual LAN is a logical method of grouping Layer-2 switchports on a local switch into different broadcast domains. VLANs can help to

Read More »
Why do we need a Web App Pentest

Why do we need a Web App Pen test

Vulnerability assessments use automation to routinely scan for routers, firewalls, servers, applications, and switches. Web application penetration testing has a limited scope. A web application

Read More »
WI-FI Hacking (Pt. 2)

WI-FI Hacking (Pt. 2)

In our previous blog post (Part 1) of the Wi-Fi Hacking series, we went through setting up our Alfa card, decloaking hidden SSID’s, passively capturing

Read More »
Misconfigured Amazon S3 Buckets

Misconfigured Amazon S3 Buckets

What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

Read More »
Wifi Hacking (Pt.1)

Wifi Hacking (Pt.1)

Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Read More »