How can you Create an Evil Twin Access Point-[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/10/How-can-you-Create-an-Evil-Twin-Access-Point.pdf” title=”How can you Create an Evil Twin Access Point”] How smart is bluetooth smart? A presentation on bluetooth smartness. [pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/how_smart_is_bluetooth_smart-mikeryan-shmoocon_2013.pdf”] RESTful Applications Security testing for RESTful applications. [pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/security-testing-for-rest-applications-v6-april-2013.pdf”] Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The … Continue reading PDF Resource Centre
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed