The poetry of (in)security

$ hello

Hackers Wanted!

>Some expletives have been edited out<

>The catching of feelings is encouraged<

>Heavy Hip Hop references included<

 

>Begin Rant<

Read on →

The BRO Chronicles 1

I was having a random conversation with Christian. The conversation was based around Kali Nethunter and all the cool stuff that can be done with it. The discussion was revolving around “man in the middle attacks” and I suggested that having BRO running on Nethunter would be awesome. This got him excited and true to his nature, he couldn’t rest till he’d attempted it. Long story short, he did some amazing work and had it running soon afterwards complete with a detailed “how to” guide. Here’s a link to the guide.

Read on →

Learning to hack

Becoming a skilled hacker or the politically correct “information security specialist” doesn’t have a straightforward defined path. Here I will try to layout what constitutes a good way to go about it.

Read on →

AfricaHackon - Be part of the story

I first heard of AfricaHackon at my previous job where I was working in IT. A colleague and friend told me about a conference about information security that would be held at our building. This was early last year. Being in charge of the network, I would be assisting in setting up internet access for the conference. Now when you’re incharge of the network and you hear you’ll be giving access to your network to a room full of the best “hackers” in the country, you get a bit nervous. I use the word “hackers” in quotes because that’s where I’d like to start.

Read on →


Crypto magic - zero knowledge

There are some applications of cryptography that can only be classified as magical. It is only fitting that my first crypto post begins with one of them - zero knowledge proofs. I will try and explain it without all the rather complicated mathematical stuff.

Read on →

Bright

who are you?

Bright Gameli Mawudor is my name. Friends in the infosec world call me ~ze3D~. A passionate information security engineer with a love for system exploitation, gleaning information from all corners of the web about a target, and social engineering using all possible methods.

Read on →

Jade

who are you?

I am Jade Solomon, an Infosec/Code machine, I dedicate a lot of sleepless nights to Reverse Engineering, GSM/Mobile technology and Exploit Development.

Read on →

ck

who are you?

I am an information security engineer with main interests in network security, hardware and radio frequency.

Read on →