| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Lesson learned in applying knowledge from the "SafeCracking on a Budget" presentation. http://2014.ruxcon.org.au/assets/2014/slides/rux-safe-cracking.pdf. We had a problem: no combination to a safe. The solution was to build a automatic our own safe dialer. We will review the steps we followed, Information gathered, Vulnerability Analysis, Exploitation, Post-Exploitation, and Reporting. (PTES Technical Guidelines style). Along the way we will share knowledge learned and stories of success and failure.
David Hunt has worked in software development for several years. Switched to focus on application security, vulnerability and penetration testing. Recently picked up the bug for safe cracking. Zack Nagaich is a Recent Ohio State computer science graduate working in cyber security for a variety of companies in the central Ohio area with a passion for software and security.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast