Profile cover photo
Profile photo
Ben Finán
592 followers -
"If you tremble indignation at every injustice then you are a comrade of mine." -Che Guevara
"If you tremble indignation at every injustice then you are a comrade of mine." -Che Guevara

592 followers
About
Posts

Post has attachment
Due to often requiring a broad knowledge of multiple disciplines and immense versatility in the threat environment, effective instruction in offensive and defensive areas of information security have posed substantial difficulties for educators. Cyber…
Add a comment...

Post has attachment
Functional assessments of security are fundamental in assuring the effectiveness of security measures in place within a system. Penetration testing attempts to exploit the technical vulnerabilities present in a network or system, often having firm rules…
Add a comment...

Post has attachment
When performing red team operations or penetration testing, one relies heavily upon automated tools to efficiently perform tasks necessary for completing the mission. There is a great deal of tools in the proverbial tool belt of the cybersecurity…
Add a comment...

Post has attachment
Performing a red team assessment against an organization is not a prescription that fits all shapes and sizes. Red teaming is very specific to the target and attempts to go a step further than simple penetration testing. When performing a penetration…
Add a comment...

Post has attachment
The Fundamentals of Penetration Test Reporting

It is crucial to a penetration tester’s success to be capable of clearly understanding the correct method for creating and interpreting a penetration test report. Pentest reports will be widely distributed in a company and read by most senior and…
Add a comment...

Post has attachment
A wireless local area network, or WLAN for short, describes the environment in which a majority of internet users access the internet on a daily basis. Literally meaning a wireless extension of a physical local area network, a WLAN provides two or more…
Add a comment...

Post has attachment
Exploiting wireless networks comes in all shapes and sizes. Since the development of wireless networking and encryption, there has been a consistent trail of hackers discovering ways to exploit the same services at nearly the same pace. WEP doesn’t…
Add a comment...

Post has attachment
BYOD (Bring Your Own Device) policies are more frequently becoming the norm for enterprise organizations around the world. Technology is far too accessible and implemented throughout the lives of everyday consumers that, without a functional understanding…
Add a comment...

Post has attachment
Controversial journalism has always been a perilous profession due to the fact that investigative journalists deal in raw, often damaging information. For decades, journalists have taken drastic measures to protect their sources of controversial…
Add a comment...

Post has attachment
When it comes to wireless security, Bluetooth is no exception to potential data leaks. Although Bluetooth voice devices have their own security flaws, Bluetooth Classic refers to the piconets based on Frequency Hopping Spread Spectrum (FHSS), defined as,…
Add a comment...
Wait while more posts are being loaded