PDF Resource Centre
How can you Create an Evil Twin Access Point-[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/10/How-can-you-Create-an-Evil-Twin-Access-Point.pdf” title=”How can you Create an Evil Twin Access Point”]
How smart is bluetooth smart?
A presentation on bluetooth smartness.
[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/how_smart_is_bluetooth_smart-mikeryan-shmoocon_2013.pdf”]
RESTful Applications
Security testing for RESTful applications.
[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/security-testing-for-rest-applications-v6-april-2013.pdf”]
Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The paper proposes some basic methods to do comprehensive local security checks and how to exploit the vulnerabilities.”
[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/aix-penetration-testers_6684_.pdf”]