SCADA considerations
Procedures Corporate Information Protection Security Management Information Classification Physical (and Environmental) Security Personnel Security Security…
Nmap Examples
Some Nmap examples I thought I would post. Scanning past Watchguard Firewalls: nmap -sS -iL…
DUKPT Overview and Transaction notes
Hi, I was asked on another post relating to DUKPT to provide some backgound. Given…
SQL Injection Cheat Sheets
From Pentestmonkey.net, this is a great list of SQL Injection cheat sheets. Oracle MSSQL MySQL…
Secure Application Development links
Hi, I have been putting some secure application development documents together recently and have found…
Internet Banking Security Assessment Considerations
I was asked some time ago to provide a list of things which may be…
Mobile Banking Security and Risk Assessment Considerations
When considering Mobile Banking security and the associated risks, an assessment approach depends greatly on…