TARLOGIC's BLOG
Cybersecurity - Page 12
Cybersecurity articles with security analysis and ethical hacking technics information
Enterprise WiFi network security audit from openwrt
The main difficulties found when performing a security audit of Enterprise WiFi network by a security analyst in ethical hacking are the following: WPA Enterprise networks imperson[...]
Read moreBackdoors in IDEs – RootedCON 2015 Talk
This article describes in detail the content of “Bend the developers to your will” talk given by Miguel Tarascó and included in RoodCON 2015 Congress. 1. Why developers? Devel[...]
Read morePlatform in the Middle – Bypass DRM protections at Content Delivery Networks
Please find below the description of the research about Platform in the Middle attacks carried out by Tarlogic and included in RootedCON 2015 congress. These attacks refer to Inter[...]
Read moreDSL Communications Interception – Introduction – Part 1
The purpose of this series of articles is to analyze communications analysis and interception strategies, specifically for DSL routers, through DSLAM devices, although it is equall[...]
Read moreMySQL stored procedures protection
Welcome to the new Tarlogic blog, where we will try to unroll technical articles focused on website security audits or cloud applications security and services deployment. In this [...]
Read more