PDF Resource Centre

How can you Create an Evil Twin Access Point-[pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/10/How-can-you-Create-an-Evil-Twin-Access-Point.pdf” title=”How can you Create an Evil Twin Access Point”] How smart is bluetooth smart? A presentation on bluetooth smartness. [pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/how_smart_is_bluetooth_smart-mikeryan-shmoocon_2013.pdf”]   RESTful Applications Security testing for RESTful applications. [pdf-embedder url=”http://infosecaddicts.com/wp-content/uploads/2018/11/security-testing-for-rest-applications-v6-april-2013.pdf”]   Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The … Continue reading PDF Resource Centre