Sep 4, 2012

Command Your Windows

Is command line obsolete in Windows system? What can you do if have no GUI? How useful are Windows command to a hacker or pen-tester when they obtain a remote shell to a windows machine?

I have wrote an article titled "Command your Windows", which is published in this month PenTest magazine (September). In this article, I will be sharing on some of the useful windows commands that a hacker or pen-tester can use when obtaining a remote shell to the system.



This magazine can be purchase on-line from PenTest Magazine website.

Please post your comments regarding this article here.
You can also email me if you are interested in this article.

Aug 3, 2012

Article in PenTest Magazine

My article on how to hack using Teensy was published in this month (July) issue of PenTest (Web App) Magazine . It is titled "Pentesting with Teensy", which talks about how you can emulate the device as a HID (Human Interface Device) and inject attack codes and execute commands in the system.



This magazine can be purchase on-line from PenTest Magazine website.

Please post your comments regarding this article here.
You can also email me if you are interested in this article.

May 31, 2012

WhatsApp InSecurity

I have recently wrote an article titled "WhatsApp InSecurity", which should be published on June issue of Hakin9 magazine. But due to some logistic issues, it is finally published on the July August issue. This article talks about how you can extract the message and photo that were send via WhatsApp.





This magazine can be purchase on-line from Hakin9 Magazine website.

Please post your comments regarding this article here.
You can also email me if you are interested in this article.


There is a video on the related demonstration, which I previously posted in "Can you extract message and photo from WhatsApp"