infoseckenya.blogspot.com infoseckenya.blogspot.com

infoseckenya.blogspot.com

Infosec Kenya

My take on security, tutorials and research.

http://infoseckenya.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR INFOSECKENYA.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

May

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Thursday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.0 out of 5 with 8 reviews
5 star
2
4 star
0
3 star
4
2 star
0
1 star
2

Hey there! Start your review of infoseckenya.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.6 seconds

FAVICON PREVIEW

  • infoseckenya.blogspot.com

    16x16

  • infoseckenya.blogspot.com

    32x32

CONTACTS AT INFOSECKENYA.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Infosec Kenya | infoseckenya.blogspot.com Reviews
<META>
DESCRIPTION
My take on security, tutorials and research.
<META>
KEYWORDS
1 infosec kenya
2 pages
3 kist tect talk
4 posted by
5 sam kihahu
6 no comments
7 email this
8 blogthis
9 share to twitter
10 share to facebook
CONTENT
Page content here
KEYWORDS ON
PAGE
infosec kenya,pages,kist tect talk,posted by,sam kihahu,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,older posts,popular posts,hacking facebook accounts,android devices vulnerability,sslstrip,blog archive,october
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Infosec Kenya | infoseckenya.blogspot.com Reviews

https://infoseckenya.blogspot.com

My take on security, tutorials and research.

INTERNAL PAGES

infoseckenya.blogspot.com infoseckenya.blogspot.com
1

Infosec Kenya: HACKING FACEBOOK ACCOUNTS

http://infoseckenya.blogspot.com/2011/05/hacking-facebook-accounts.html

My take on security, tutorials and research. Friday, May 13, 2011. My wireshark adventures continue, this time round I decided to focus on using the information I obtained from my sniffing captures and see how I could leverage that to break into something J. Before reading on ,let it be known that this attack is easily nullified by setting your facebook account to use https instead of http. Here is how to set your account to use https:. Select account settings and click. Click on account security. Httpco...

2

Infosec Kenya: April 2014

http://infoseckenya.blogspot.com/2014_04_01_archive.html

My take on security, tutorials and research. Tuesday, April 8, 2014. I recently had an opportunity to do a presentation on Android security at USIU (United States International University), Nairobi and had great time. Thanks to the students for listening and the questions and administration for the chance to spread the Android security gospel. This is the same presentation I gave at the first AfricaHackon. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. REVERSE ENGINEERING ANDROID APPS.

3

Infosec Kenya: AUTOMATIC SSH - DHCP - BACKTRACK

http://infoseckenya.blogspot.com/2011/03/automatic-ssh-dhcp-backtrack.html

My take on security, tutorials and research. Thursday, March 24, 2011. AUTOMATIC SSH - DHCP - BACKTRACK. I needed to set up my backtrack machine so i could ssh into it from my normal workstation and do interesting stuff when idle. My aspiration was set back by the following facts:. 1) sshd is not enabled by default to boot at system start. 2) Backtrack 4 doesn't bring up the ethernet interface by default on boot, this interface is needed by sshd to bind to. Rc - runlevel compatibility. AUTO - MIGRATE A M...

4

Infosec Kenya: October 2013

http://infoseckenya.blogspot.com/2013_10_01_archive.html

My take on security, tutorials and research. Friday, October 4, 2013. Benfords Law And Fraud Detection. A particularly interesting mathematical law that finds application in fraud detection is Benford's law or the first digit law. The law refers to the frequency distribution of digits in many (but not all) real-life sources of data. By real life, data like date , age, regularly incremented data does not qualify. The probabilities of the first digit from Benford's law once plotted show the curve below.

5

Infosec Kenya: PASS THE HASH ATTACK

http://infoseckenya.blogspot.com/2011/03/pass-hash-attack.html

My take on security, tutorials and research. Tuesday, March 8, 2011. PASS THE HASH ATTACK. Once a windows user creates a username and password, the password is hashed by two algorithms i.e LM (LAN MANAGER) which uses DES (data encryption standard) algorithm and the NTLM (NT lan manager). The resultant hashes are concatenated to form one single hash file that is stored in the sam file. Once you have compromised one machine, you can leverage the hash information obtained by the hashdump utility. BLANK PASS...

UPGRADE TO PREMIUM TO VIEW 14 MORE

TOTAL PAGES IN THIS WEBSITE

19

LINKS TO THIS WEBSITE

davidgouveia.net davidgouveia.net

Simple script to check expiry dates on a java keystore (.jks) file | David Gouveia

http://www.davidgouveia.net/2013/07/simple-script-to-check-expiry-dates-on-a-java-keystore-jks-file

Bits and Bytes of geekly information. Android ksoap2 stub generator. Strava GPX merge tool. Controlling relays using Micropython and an ESP8266. ZSUN Wifi card reader part 2 – EAGET A50. How to setup Ozone Strike Battle keyboard on OSX. Avoid being locked out of your ZSUN wifi reader. Esp8266 Witty ( kind of ) intro. On Avoid being locked out of your ZSUN wifi reader. On How to setup Ozone Strike Battle keyboard on OSX. On Avoid being locked out of your ZSUN wifi reader. July 11, 2013. Timeout -k 10s 5s.

UPGRADE TO PREMIUM TO VIEW 0 MORE

TOTAL LINKS TO THIS WEBSITE

1

OTHER SITES

infosecjobs.org infosecjobs.org

Website hosted by Entropy Internet

Welcome to Your New Hosting Package. This is your index.html page. Please replace this when you upload your website.

infosecjunction.com infosecjunction.com

InfoSecJunction :: Your Information Security Partner

Welcome toInformation Security Junction. This is a Junction. For all your information security related matters. We aimed to focus Information Security related news, articles, subjects, interviews, products and so on. Feel free to submit your views, queries, feedback to improve the knowledge on Information Security. You may send your queries to info@infosecjunction.com. 25/04/2013 How twitter security becomes National Security Concern? Hackers target Abu Dhabi residents. The Cobrapost.com website is s...

infoseckaizen.com infoseckaizen.com

Information Security Kaizen - Information Security Continuous Improvement

Information Security Continuous Improvement. Sorry, but nothing matched your search terms. Please try again with some different keywords. Theme by Out the Box.

infoseckaizen.net infoseckaizen.net

Paul Love - InfoSecKaizen

Kaizen is the Japanese word for continuous improvement. Paul is a technology leader with 20 years of experience managing information security in financial services, insurance, utilities, software, cloud services and government industries. Paul is highly skilled in security operations, security policies, incident response, threat intelligence and regulatory compliance. He is adept at making security understandable to business users. Paul Love speaking at a conference. Paul’s other sites:.

infoseckaizen.org infoseckaizen.org

Paul Love - InfoSecKaizen

Kaizen is the Japanese word for continuous improvement. Paul is a technology leader with 20 years of experience managing information security in financial services, insurance, utilities, software, cloud services and government industries. Paul is highly skilled in security operations, security policies, incident response, threat intelligence and regulatory compliance. He is adept at making security understandable to business users. Paul Love speaking at a conference. Paul’s other sites:.

infoseckenya.blogspot.com infoseckenya.blogspot.com

Infosec Kenya

My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. One of th...

infoseckeynote.com infoseckeynote.com

InfoSec Keynote Series

Infosec Keynote Series event by ClubHack is coming to Delhi/NCR. Partner – Ernst and Young, India. VP – Speciality Line and Reinsurance, Prudent. Advocate Cyber Crime, Supreme Court. InfoSec Keynote series talks are for the cream of the crop leaders of IT and security industry. IF you are one of the following, it’s a must attend event for you. CEO, CISO, CIO, CTO, CSO and even CFO. VP Engineering, VP Security. Director IT, Director Security. The Benefits of Keynote Event are:. Proudly powered by WordPress.

infoseckicks.com infoseckicks.com

InfoSecKicks

I’ve talked about domain trusts more than many people probably care about. A few weeks ago I posted Domain Trusts: We’re Not Done Yet apparently there’s even more! History of the Disclosure Debate. History of the Disclosure Debate. Researchers Create First Firmware Worm That Attacks Macs. Researchers Create First Firmware Worm That Attacks Macs. Building an Empire with PowerShell. Building an Empire with PowerShell. Slide deck from "Building an Empire with PowerShell". Really good reading. Everyone knows...

infosecla.blogspot.com infosecla.blogspot.com

infosecla

Lunes, 3 de diciembre de 2012. Saucedo Alfio re electo en Garbarino Lanús. El Cro. Saucedo Alfio re electo el viernes pasado en Garbarino Lanús por un nuevo periodo de 2 años con el acompañamiento de 36 votos positivos sobre 36 compañeros habilitados para votar. Miércoles, 28 de noviembre de 2012. Indemnización por muerte en el trabajo. ESTO GENERALMENTE NO SE CONOCE MUY BIEN Y. Cámara Nacional de Apelaciones del Trabajo -. 11 de Octubre de 2012. TRABAJADOR ASPIRANTE CON HIV. OTRO FALLO SOBRE DISCRIMINAC...

infoseclab.blogspot.com infoseclab.blogspot.com

Information Security Playground

A collection of security related tips and tricks, articles, references, papers and tools. A few words bout the blog. Just a try to keep in one place anything interesting I come up to wile surfing the net. Occasionally I’ll try to post thoughts and expediencies regarding IT security, but that would be rare till I buy some free time… Cheers everyone, enjoy! Friday, 11 April 2008. Improving Software Security Analysis using Exploitation Properties. No Support for ASLR. No Support for SafeSEH. Posted by V for...