BYOD (Bring Your Own Device)

BYOD (Bring Your Own Device): A Powerful Trend Forcing Companies to Reinvent the ‘Corporate Security Model’

Abstract: Companies no longer need to focus on letting their IT departments drive the technology of the business. Employees demand the most out of their equipment, and need access to corporate networks and applications from anywhere, on any device. With the proper implementation, BYOD can not only reduce cost and generate revenue, but can create…

Hacking WPA / WPA2 Encrypted Networks in Backtrack 5 R3

Hacking WPA / WPA2 Encrypted Networks

Part II of my Network Security How-To Series: 1)  ARP Spoofing from a Mobile Device 2)  Hacking WPA / WPA2 Encrypted Networks (This Tutorial) 3)  Defeating SSL / Encrypted Hijacking Target of Attack: – WPA/WPA2-PSK Wireless Networks Tools Required: – Any Computer with VMware software installed. (Download Here) – Backtrack 5 VMware Virtual Machine. (Download Here) – Compatible…

Snapchat Office

Snapchat under FTC Investigation

Some results from the forensic investigation revealed that images that Snapchat claims to be deleted are in fact still stored on the users phones. Snapchat simply renames the file extension to .NOMEDIA making the file un-viewable. By simply removing the .NOMEDIA extension, the pictures become viewable again. With the increase in mobile device communication, it…

USB Redirection in VMWare

USB Device Redirection in VMware

This post is regarding setting up manual USB Device pass through with ESX/vCenter Server 4.1 and VMware View 4.6 Background Recently, I have been working on setting up a VDI pool that housed an application that was previously installed locally on a majority of assets where I work. The problem I was running into was…

Conducting Cyber Investigations

Conducting Cyber Investigations

“The simpler the program is to the end-user, the more complex the coding; the more complex the coding, the more likely that fragments of information will be left behind. The theory of application stupidity is likely to become more pervasive as the complexity of operating systems and programs increase to keep pace with a growing…