network security

Watching yOUr Permissions

Often, one of the main goals of a pen tester is to get Domain Admin (DA) rights in a client’s Windows network.  But why do we want to get that level of access? For some, it may just be the satisfaction of navigating far enough to compromise the DA account.  But, in reality, gaining DA …

Watching yOUr Permissions Read More »

Wireless Attacking EAP-TTLS with Kali 2 and ALFA AWUS051NH

Is your corporate wifi as secure as you think it is? A common configuration for WPA Enterprise wireless networks is to use a combination of PEAP (Protected EAP) and EAP-TTLS (Tunneled Transport Layer Security). Though this configuration solves several issues found in other configurations, it (sometimes) also has its own fatal flaw. If a client …

Wireless Attacking EAP-TTLS with Kali 2 and ALFA AWUS051NH Read More »

SamuraiWTF 3.2 RELEASED!

We are really excited to announce that SamuraiWTF 3.2 is now available publicly.  This release is available at http://sourceforge.net/projects/samurai/ immediately and we hope you enjoy it. In this release we have updated a number of tools, addressed bug issues, and improved the target environments to better suit a training environment. We have also updated the …

SamuraiWTF 3.2 RELEASED! Read More »

Is that a Shark? — Common Security Mistakes Organizations Make

At Secure Ideas, we work with a large number of organizations. These range from small mom-and-pop businesses to international corporations and government agencies. In any of these examples, we find that CIOs and management make the same mistakes when it comes to dealing with their security issues. When people talk about security and risk, we …

Is that a Shark? — Common Security Mistakes Organizations Make Read More »

Oversharing: Who Has Access?

 What types of information do you copy to a shared folder?  Who has access to the share?  This can be a difficult problem within many organizations to handle these questions.  From a user perspective, a shared folder is just a means to collaborate.  We often don’t think about what type of data is in the …

Oversharing: Who Has Access? Read More »

Scroll to Top