How can you Create an Evil Twin Access Point-How can you Create an Evil Twin Access Point
How smart is bluetooth smart?
A presentation on bluetooth smartness.how_smart_is_bluetooth_smart-mikeryan-shmoocon_2013
Security testing for RESTful applications.security-testing-for-rest-applications-v6-april-2013
Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The paper proposes some basic methods to do comprehensive local security checks and how to exploit the vulnerabilities.”aix-penetration-testers_6684_