Security Testing Blog Post and Video Series

Planning for Security Testing Security testing is critical component of a security program and needs to be done on a regular basis.  However, I’ve noticed that how companies use security testing varies wildly.  Some companies have their testing integrated into their plans for the year.  Their tests are scheduled in advance and they know what needs to be focused on. … Read More

Penetration Testing Services Now Available!

I’m very excited to announce that Paladin Security is now offering penetration testing as part of our services!  For the last 5 years I have been working full time as a penetration tester and consultant at Secure Ideas.  Being a part of this incredibly talented team was exciting and a bit humbling at times.  However, it was time for a … Read More

Penetration Testing Tools and Equipment

Getting started with penetration testing Penetration testing is often looked on as an elite set of skills that only a few can learn.  It’s also thought that expensive equipment and tools are needed to perform a penetration test.  You may think that you can’t get started in it because you don’t have the money to buy the required gear.  It’s not … Read More

The Challenges of Learning Something New

The last six months have been very interesting as I’ve grappled with some ambitious goals and learning some very new skills.  Around October of last year I decided to give online training a try and what a ride it has been.  I’ve had good technical skills for quite a while and I’ve been a professional trainer.  I had already written … Read More

Giving Back and Good Karma

“No man who continues to add something to the material, intellectual and moral well-being of the place in which he lives is left long without proper reward.” Booker T. Washington I know this is primarily a technology related blog, but lately I’ve been thinking about some of the influences and turning points in my life.  I’ve always known that I … Read More

Looking for Malicious PHP Files

I’ve been digging through some PHP files that are trying very hard to hide what they are doing. Basically, the PHP code is base64 encoded and then compressed. The blob of random text is then stuffed into a PHP file which calls eval(gzinflate(base64_decode(“BLOB OF TEXT”))); to decode it and execute it on the web server. While it obscures what the … Read More

Metasploit Breaks into SkyNet!

Metasploit has successfully broken into Skynet thanks to Comodo, RSA, MySQL and Stuxnet! Here is the output from msfconsole after updating today. Rock on guys.

Desktop Blog Editors

I’ve been grumbling to myself about writing blog posts using the web interface in WordPress for quite some time, but I’ve never really done much about it.  Today I spent some time chatting with David Pratt, a colleague of mine, about our blogs.  David runs the Data Management Wonk blog and I liked how his blog posts look when they … Read More

Data Ownership, Governance and Controls

A friend of mine asked a question on Facebook that went something like this. Who owns your company’s data? The politically correct answer is that the business owns the data and IT manages it for them. That’s nice in theory, but is it really true? Does your company have a data governance group (run by the business) that actually sets … Read More

Reconnoiter Updated

I spent some time today and fixed some seriously messed up regular expressions in Reconnoiter.  Basically, Google made a bunch of changes to their search results and added AJAX all over the place.  To deal with this, I changed the submitted user agent to Lynx and then updated the regex accordingly.  Changes with regex were made to and username_gen.rb … Read More