How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

FOCA: Target Information Gathering with Metadata

Metadata is an interesting and often unrealized problem for anyone who uses office applications, like Microsoft Office, OpenOffice, and Adobe Acrobat. Its impact is often misunderstood both from the publicity and security standpoint. On one hand, metadata provides the necessary … Continue reading