Tuesday, 5th November 2024.

Posted on Tuesday, 26th January 2010 by Michael

Using your web server logs to find compromised web servers Some people use Google and Google hacking Database to find their targets and others use their own servers to find potential compromised boxes. In this quick little update I am going to give you a basic idea on how to use your web server’s access […]

Posted in Papers | Comments (2)

Posted on Monday, 25th January 2010 by Michael

Poison Ivy Revisited Over a year ago I wrote a post on the Poison Ivy Trojan (Tool) by the team over at http://poisonivy-rat.com. The original post can be found here http://digitaloffensive.genxweb.net/2009/09/fun-with-poison-ivy/. I wanted to take a few minutes to add another function I discovered at the last CCDC that made this tool that much better. […]

Posted in Papers | Comments (1)

Posted on Friday, 15th January 2010 by Michael

Recently I was reading an article about using Ruby on Rails to create a web scraper as I sat there and learned Ruby I got really excited to jump to the point and build a web scraper. Though as any programmer knows that is not possible until you have the base understanding of the language […]

Posted in Code | Comments (0)

Posted on Friday, 15th January 2010 by Michael

Well it’s been a slow few months now and not much to write about or time to research topics to write about. So if you have any ideas thoughts of something you like to know more about let me know and if I choose your topic I will post the results of my research here. […]

Posted in Blog | Comments (0)

About Consulting Store