How can you Create an Evil Twin Access Point-[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/10/How-can-you-Create-an-Evil-Twin-Access-Point.pdf” title=”How can you Create an Evil Twin Access Point”]

How smart is bluetooth smart?

A presentation on bluetooth smartness.

[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/how_smart_is_bluetooth_smart-mikeryan-shmoocon_2013.pdf”]

 

RESTful Applications

Security testing for RESTful applications.

[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/security-testing-for-rest-applications-v6-april-2013.pdf”]

 

Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The paper proposes some basic methods to do comprehensive local security checks and how to exploit the vulnerabilities.”

[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/aix-penetration-testers_6684_.pdf”]