pentest.ro

  • Home
  • About me
  • Contact
  • Security concerns regarding cloned Facebook accounts

    What is Facebook account cloning? A form of identity theft in which a malicious attacker impersonates a legitimate user. This is done by creating a copy of the original account. An attacker would most likely: create an account under the same name as the victim using a public email address (Gmail, Yahoo, etc.) copy all…

    July 27, 2014
  • Intercepting custom communication protocols in Windows 7

    Actually, the title should have been: “Don’t feel lucky and go beyond the first result in a Google search”. I’ve been using EchoMirage for some time but apparently I’ve been using the wrong one. Because when you search for it in Google you normally click the first link. Right? Wrong!

    June 30, 2014
  • Lock-picking, lock-pickers and hacking

    I’ve never been that much into lock-picking myself, never quite got too excited by the subject. Until I’ve seen this guy and his awesome presentation. You feel like taking the tools and start practicing on your front door after seeing this. Or on your neighbors door, depending on your preferences and where you want to…

    June 8, 2014
  • Defcon – the movie

    Like Hangover with geeks

    April 18, 2014
  • Does it pay to be a BlackHat hacker?

    Dan VASILE @DefCamp Bucharest 2013

    December 4, 2013
  • Hacking the WordPress Ecosystem

    I delivered a speech at OWASP Romania InfoSec Conference 2013 in Bucharest (I took part in the organization of the event as well). Dan Catalin Vasile – Hacking the WordPress Ecosystem from Dan Catalin VASILE

    October 28, 2013
  • Bug Bounty Programs

    October 4, 2013
  • Building an InfoSec RedTeam

    Building an InfoSec RedTeam from Dan Catalin VASILE

    October 4, 2013
  • Change MAC address in iOS for iPhone/iPad

    In older versions it used to be as easy as: # ifconfig en0 ether xx:xx:xx:xx:xx:xx For iOS versions >5 you have to resort to nvram: # nvram wifiaddr=xx:xx:xx:xx:xx:xx and then reboot the device. Prerequisite: jailbroken device, terminal access (local or SSH) and sudo.

    July 31, 2013
  • Traffic mirroring in Linux

    It comes in hand when analyzing traffic to forward a copy of the traffic to a specific IP where a machine is listening and running Wireshark & stuff. It’s very useful for routers that don’t have the capabilities to run network analysis tools (like DD-WRT). Just run the following commands replacing the xxx.xxx.xxx.xxx field with the…

    July 31, 2013
←Newer Posts Older Posts→

pentest.ro

Proudly powered by WordPress