Penetration Testing with Perl

July 13, 2014 in 802.11, Information Security, Programming, Publications, Systems Administration by trevelyn

The page is up for my newest book “Penetration Testing With Perl” !! I just finished Chapter 7 (SQL Injection with Perl) which was a very long chapter. There will be 13 so far, so I am closer to finishing than I was during my last post about it. It’s an amazing experience, in which I learn, get frustrated, get excited and happy, and feel the absolute power of Perl at my fingertips all at the same time. This is definitley my life’s biggest work to date. They have the amazon page up too, and the book will also be
read more

Digital Credential Analysis

June 23, 2014 in Howto, Information Security, Programming, Publications, Web Secuirty, WiFi Hacking by trevelyn

Rather than write a “free” article for an online magazine, I figured I’d just put this right here on my site. It’s a simple proposal for credential analysis from leaked credentials and from those gleaned during a penetration test for more accurate, targeted credential attack vectors. I propose not only simple methodology practices as examples, but even terminologies for the practice as well. Hope you enjoy, ~Douglas

C Programming Tutorial 10

May 25, 2014 in Howto, Programming by trevelyn

Linkage and Automatic Variables There are two different kinds of linkage for C variables; internal and external. And, of course, can also have variables with no linkage at all. But, what is linkage? Well linkage refers to the life span and scope of the variable. When we went over for() loops in tutorial 7, we were using an automatic variable i. i only lived within the for() loop and the scope only allowed i to be accessed inside the block, or compound statement of it’s parent for() loop. This is an automatic variable and we say that it has no
read more

WARCARRIER for Android Tablets (Update)

March 11, 2014 in 802.11, Android, Mobile Development, Phone Phreaking, Programming, Warcarrier Application by trevelyn


WARCARRIER for Android Version 1.1

March 1, 2014 in 802.11, Android, gallery, Information Security, Mobile Development, Phone Phreaking, Programming, Warcarrier Application, WiFi Hacking by trevelyn

Almost complete. WARCARRIER for Android Tablets. This is the main screen at startup, including the menu options. Click on “catchMeNG! in the settings bar at the top right and you can input a string to troll for. This includes Bluetooth devices, BSSIDs, ESSIDs, etc. You can also choose “Plot Waypoint” to plot a new way point onto the Google Map: If you long-press on a any field (as the “Help” dialog shows from the Settings menu) You can find more information on the specific data that is presented. And as of 1.1 Beta, you can plot and scan for Bluetooth
read more