It was discussed during the last edition of BlackHat Europe: Maltego v3 was almost ready to be released. Today is the D-day: The latest version is out! A quick reminder for those who still not know the product: “Maltego is an open source intelligence and forensics application. It will offer
Never Trust the Files Downloaded from the Internet
It became a daily action for most of us: We are looking for a piece of software which could improve our tasks. Google provides us thousands of links, we select the most attractive, download it and install it (there is no restriction in the users not the operating systems). That’s
Hack In The Box Visits Europe
Hack In The Box (or “HITB“) is a well known community on the security landscape which defines itself as “a single place, or community, on the Internet where people and corporations can go to find security information and the latest news from the underground and computer technology sectors“. HITB maintains
Blog Moved
The blog has been moved to a new hardware. Please report any error or issue! Happy reading!
Analyzing your Pcap Files with the Cloud
pcapr.net is a cloud (again!) service available for a while. Basically, it’s a repository of pcap (“packet capture”) traces uploaded by members. The packets are dissected and presented in a human readable form. Once inspected and indexed, a search engine helps you to find interesting traces using a simple syntax
Increase your Surf Privacy with IPFuck
The debate is ongoing for a while and has partisans on both sides: Can an IP address be considered as private data? Europe said yes and the “fight” between privacy protectors and authorities is still present. Having your IP address considered as private from a legal point of view or
Identification is not Authentication
I received a notification from my bank about the availability of my new credit card. This morning, I went to my local agency to pick it up. Because I don’t receive a new credit card every six months, I always discover the new procedure implemented by my bank. This time,
Bad Example of Data Management
There is an ongoing communication campaign for a big interim company on the Belgian radio stations. The message they are broadcasting is: “Do not rely on your company physical assets but more on people“. And they are right! People are the most important value of a company. Even if you,
Vulnerability Scanner within Nmap
Port and vulnerability scanners are common tools used by good as bad guys. Performing a port scanning is one of the first operations required to find potential vulnerabilities on a target system. That’s why vulnerability scanners have built-in port scanners. Writing a port scanner is really easy with a few
OWASP Belgium Chapter Meeting Wrap Up
I’m back from the latest OWASP Belgium Chapter meeting. Belgium is a small country with lot of political issues (off-topic here 😉 ) but also a great electronic identify card or “eID“. Almost all Belgian citizens have an eID for a while (8.2 millions of cards have been delivered up