Bulb Security: Penetration Testing, Security Research, Training

Search
FacebookTwitterGithubLinkedin
Bulb SecurityBulb Security
Bulb Security
Training, Assessments and Research

Meet the Bulb Security Team

contact@bulbsecurity.com
  • Home
  • Services
    • Security Training
    • Security Assessment
    • Penetration Testing
    • Research & Development
    • Mobile Security
  • Products
    • Smartphone Pentest Framework
    • Penetration Testing: A Hands-On Introduction to Hacking
  • Public Speaking
    • Security Conferences
  • Media Activity
  • About
    • About Us
    • Testimonials
    • Careers
  • Contact
  • Home
  • Services
    • Security Training
    • Security Assessment
    • Penetration Testing
    • Research & Development
    • Mobile Security
  • Products
    • Smartphone Pentest Framework
    • Penetration Testing: A Hands-On Introduction to Hacking
  • Public Speaking
    • Security Conferences
  • Media Activity
  • About
    • About Us
    • Testimonials
    • Careers
  • Contact

Author Archives: Georgia Wiedman

You are here:
  1. Home
  2. Article author Georgia Wiedman

More Book Exercises: Guessable Credentials-Apache Tomcat

In the book we looked at specific examples of vulnerabilities. My goal was to cover as many classes of issues as possible, though of course I could not cover every possible issue you might encounter on your pentests. As you continue your penetration testing career, you will need to take what you have learned and…

January 19, 2015Leave a commentTrainingBy Georgia Wiedman

Finding Bad Characters with Immunity Debugger and Mona.py

In my book chapters about exploit development, I note that finding bad characters is outside of the scope of the chapters and just give the readers the bad characters list. With only four exploit development chapters in the book, there is just so much I can cover. My editors asked me to provide a resource…

February 12, 2014Leave a commentResearchBy Georgia Wiedman

Superbowl 4 Hackers Announcement

This capture the flag game and accompanying class is designed with security beginners and those who are new to CTFs in mind. The vulnerabilities will range from blank passwords to custom buffer overflow vulnerabilities. Choose the instructor of your choice and work with the rest of the students to defend servers built by the other…

February 6, 2014Leave a commentAnnouncementBy Georgia Wiedman

Backdooring APKs Programmatically

One of the features of SPF is being able to take a compiled Android APK and refactor it to include the SPF Agent. Details of how to do this in SPF are in the SPF User manualBackdooring APKs section. The resulting app looks and feels like the original app, but with some extra functionality. In…

January 22, 2014Leave a commentProgrammingBy Georgia Wiedman

Pivoting a Shell through Android with SMS

I’ve been messing with SMS for hidden out of bounds communication since 2011. My earlier work involved a backdoored device driver: Demo Video: Background SMS Demo Whitepaper: Transparent Botnet Command and Control for Smartphones over SMS PoC Code: botPoCrelease-android.c Slides: Shmoocon 2011 Slides Working at the application layer in Android is for one easier and…

January 14, 2014Leave a commentMobileBy Georgia Wiedman

Using Infected Mobile Devices to Attack Nearby Devices

This post assumes basic knowledge of using the Smartphone Pentest Framework (SPF). Specific required knowledge is referenced in the User Manual as it is referenced. SPF can be downloaded here: Github The SPF User Guide is here: User Guide Videos about SPF are here: SPF Videos In 2013 I started taking a look at the…

January 8, 2014Leave a commentMobileBy Georgia Wiedman
© 2016 - Bulb Security
  • Home
  • About
  • Services
  • Products
  • Blog
  • Contact
Footer