-
Archives
- March 2026
- February 2026
- January 2026
- January 2025
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Category Archives: Pentest
Book Review: PoC||GTFO
Yes, I’m back to blogging and doing a book review. I guess better late than never 🙂 This time I’m reviewing the holy hacker book: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO, ISBN-13: 978-1-59327-880-9). The book sums … Continue reading
Posted in Books, Pentest, Privacy, Security, Technology
Tagged Book, exploit, Information Security, Penetration Testing, Poc||GTFO, Software Security
2 Comments
Fristileaks 1.3 CTF Writeup
This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did, see Fig 1. … Continue reading
Posted in Pentest, Security, Technology
Tagged CTF, CyberSecurity, hacker, Penetration Testing, Python, recon
Leave a comment
Cyber Intelligence Universe
In recent years all “cyber” is fashionable, and intelligence applied to the cyber world could not be less! The concept of intelligence has an offensive meaning due to the use by intelligence and military agencies, but now too many security … Continue reading
Heartbleed: pain, blood and code
All alarms went off last week when a serious security flaw called Heartbleed in the OpenSSL cryptographic library was published. This library is used by a large part of the servers on the Internet as well as much security software. … Continue reading
Posted in Pentest, Security, Technology
Tagged Application Security, attack vector, Information Security, Software Security
Leave a comment
Spaniards in the Black Hat ASIA
I’m back from Black Hat ASIA 2014 in Singapore, where I had the pleasure of giving a talk on the security of cross-platform mobile technologies for developing mobile apps. The last Black Hat ASIA was in 2008 and the last … Continue reading
Posted in Conference, Pentest, Technology
Tagged Application Security, Apps, Conference, Penetration Testing, Reverse Engineering, Smartphone, VULNEX
Leave a comment
The need to evolve defensive security to offensive security
This morning I saw a job offer from Facebook looking for offensive security engineers and I thought it would be a wonderful opportunity to explore this idea and its application in corporate security. Traditionally information security in enterprises has a … Continue reading
Posted in Pentest, Security
Tagged attack vector, Computer Network Operations (CNO), Offensive Security, Penetration Testing
2 Comments
Enterprise Computer Security must CHANGE
Last week I had the pleasure of giving a talk entitled “Cyber Security: time for change” on my vision of corporate cyber security posture during an event organized by Page Personnel Spain (thanks for having me!), and I already advance … Continue reading
AppSecUSA & BinSecSweeper Talk
Last week the OWASP AppSecUSA 2013 conference was held in the legendary New York City , where I had the pleasure of giving a talk on security software development title “Verify Your Software for Security Bugs” and present my new … Continue reading
Posted in Conference, Pentest, Security, Technology
Tagged Application Security, Apps, Information Security, Penetration Testing, Python, SDL, Software Security, VULNEX
Leave a comment
Book Review: iOS Hacker’s Handbook
I have been wanting to read this book for a long time, finally I managed to make time and I have to admit that it has exceeded my expectations. This magnificent work written by reputed experts in iOS, one of … Continue reading
Posted in Books, Pentest, Security, Technology
Tagged apple, Application Security, Book, exploit, Fuzzing, iOS, Penetration Testing, Reverse Engineering, Smartphone
Leave a comment
AppSec: Myths about Obfuscation and Reversing Python
Python is an easy and powerful programming language that allows us to write sophisticated programs: Dropbox and BitTorrent are excellent examples. It is common that Python programs are delivered in source code, but in some cases different techniques like obfuscation … Continue reading
Posted in Pentest, Privacy, Security, Technology
Tagged Application Security, attack vector, Penetration Testing, Python, Reverse Engineering, Software Security
15 Comments


