• DEF CON 24 Wireless Monitoring Services –
    One of the frequent things you hear leading up to DEF CON is that it is the most dangerous network in the world. Ask anyone, and they’ll tell you that if you don’t lock down your devices you will get pwn’d. I wanted to know if it really is the most dangerous network. Also I wanted to know how I could protect myself.


  • PowerOPS –
    PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”


  • Follow-Up on CVE-2016-1409 – IPv6 NDP DoS Vulnerability –
    After seeing Christopher’s post I decided to create a proof using GNS3 and Virtualbox.
    The aim is to perform the exact attacking using Antonios Atlasis’ Chiron tools and run a Wireshark packet capture to prove the hop limit drops below 255.