Bulb Security: Penetration Testing, Security Research, Training

Search
FacebookTwitterGithubLinkedin
Bulb SecurityBulb Security
Bulb Security
Training, Assessments and Research

Meet the Bulb Security Team

contact@bulbsecurity.com
  • Home
  • Services
    • Security Training
    • Security Assessment
    • Penetration Testing
    • Research & Development
    • Mobile Security
  • Products
    • Smartphone Pentest Framework
    • Penetration Testing: A Hands-On Introduction to Hacking
  • Public Speaking
    • Security Conferences
  • Media Activity
  • About
    • About Us
    • Testimonials
    • Careers
  • Contact
  • Home
  • Services
    • Security Training
    • Security Assessment
    • Penetration Testing
    • Research & Development
    • Mobile Security
  • Products
    • Smartphone Pentest Framework
    • Penetration Testing: A Hands-On Introduction to Hacking
  • Public Speaking
    • Security Conferences
  • Media Activity
  • About
    • About Us
    • Testimonials
    • Careers
  • Contact

Blog

You are here:
    Home

More Book Exercises: Guessable Credentials-Apache Tomcat

In the book we looked at specific examples of vulnerabilities. My goal was to cover as many classes of issues as possible, though of course I could not cover every possible issue you might encounter on your pentests. As you continue your penetration testing career, you will need to take what you have learned and…

Details
January 19, 2015Leave a commentTrainingBy Georgia Wiedman

Finding Bad Characters with Immunity Debugger and Mona.py

In my book chapters about exploit development, I note that finding bad characters is outside of the scope of the chapters and just give the readers the bad characters list. With only four exploit development chapters in the book, there is just so much I can cover. My editors asked me to provide a resource…

Details
February 12, 2014Leave a commentResearchBy Georgia Wiedman

Superbowl 4 Hackers Announcement

This capture the flag game and accompanying class is designed with security beginners and those who are new to CTFs in mind. The vulnerabilities will range from blank passwords to custom buffer overflow vulnerabilities. Choose the instructor of your choice and work with the rest of the students to defend servers built by the other…

Details
February 6, 2014Leave a commentAnnouncementBy Georgia Wiedman

Backdooring APKs Programmatically

One of the features of SPF is being able to take a compiled Android APK and refactor it to include the SPF Agent. Details of how to do this in SPF are in the SPF User manualBackdooring APKs section. The resulting app looks and feels like the original app, but with some extra functionality. In…

Details
January 22, 2014Leave a commentProgrammingBy Georgia Wiedman

Pivoting a Shell through Android with SMS

I’ve been messing with SMS for hidden out of bounds communication since 2011. My earlier work involved a backdoored device driver: Demo Video: Background SMS Demo Whitepaper: Transparent Botnet Command and Control for Smartphones over SMS PoC Code: botPoCrelease-android.c Slides: Shmoocon 2011 Slides Working at the application layer in Android is for one easier and…

Details
January 14, 2014Leave a commentMobileBy Georgia Wiedman

Using Infected Mobile Devices to Attack Nearby Devices

This post assumes basic knowledge of using the Smartphone Pentest Framework (SPF). Specific required knowledge is referenced in the User Manual as it is referenced. SPF can be downloaded here: Github The SPF User Guide is here: User Guide Videos about SPF are here: SPF Videos In 2013 I started taking a look at the…

Details
January 8, 2014Leave a commentMobileBy Georgia Wiedman
CONTACT US TODAY

Submitclear

TESTIMONIALS
  • “I just wish to thank you so very much for the opportunity your training gave me to move on to bigger and better things!”

    Student, Online Pentesting Training
  • “I will definitely be back for some more advanced security stuff!”

    Student, Training
    Veenendaal, Netherlands
  • “Trainer Georgia was very skilled – she knows what she preaches!”

    Student, Training
    Veenendaal, Netherlands
  • “I took tons of notes and met a ton of cool people in the field.”

    Student, Training
    Unallocated Space, Maryland
  • “Georgia did a great job…
    She backed up my decision to totally isolate our wireless network from our corporate network.”

    Attendee
    Takedowncon St. Louis Conference
Contact Info
  • Email
    contact@bulbsecurity.com
  • Social Media

Find us on:

FacebookTwitterLinkedinGithub
Search
© 2016 - Bulb Security
  • Home
  • About
  • Services
  • Products
  • Blog
  • Contact
Footer