Showing: 1 - 10 of 16 RESULTS
Remote Workforce: Attack and Defense

Remote Workforce: Attack and Defense

COVID-19 has pushed most of our workforce to work from home. This has sped up cloud initiative in many organizations. This speedy deployment of work from home infrastructure, particularly cloud, did not go through much planning. The untouched security considerations to support these rapid deployments has led to an increase in risk to organizations. This …

Building Web Application Labs with WebSploit

Building Web Application Labs with WebSploit

In this session, we will explain how to build a web application hacking comprehensive lab in less than 10 minutes. We will go over some of the initial basic settings and Docker containers with intentionally vulnerable applications; and we will end the session with several complex topics and scenarios. From a fellow veteran, this training/breakout …

Android Vulnerability Exploitation

Android Vulnerability Exploitation

Android is a popular operating system around the world. Yet, its vulnerability in the Android Debug Bridge (ADB) tool allows attackers to remotely gain root access on android devices, like phones, smart TVs, and multimedia devices in cars. Further damages can be done, such as leaking users’ information and interacting with the Android system. This …