info@aerstone.com (301) 760-7604

The MegaUpload Shutdown, A Year Later

It’s been a little over a year and a half ago the FBI seized servers leased by the once predominant file sharing service Megaupload, shutting down roughly 25 petabytes of data. The FBI targeted Megaupload (soon to be re-launched and re-branded as...

Network Scanning Done Right

Network scanning starts as a simple task… nmap -oA target Unfortunately, it quickly turns into a complicated endeavor requiring a combination of automation, manual tuning, intuition, and discipline. Here are a few gotchas we regularly run into and try to solve....

Hacking a Web Application

This video shows the process of gaining root access to a web server by hacking the web application, performed by Aerstone’s lead penetration tester Curt Stapleton.  The demo covers discovery, mapping the app, defeating the login, elevating privileges, and...

Should Agencies Choose One Device Over Another?

Government agencies that would like to make the switch from blackberry devices to Iphone and Android not only have to worry about how to manage and certify them, but also which brand loyalty to sign on to. Starting off with android, Google has made it clear that they...

Government Mobile Device Integration

  With Local, State and Federal agencies assigning their workforce mobile devices in the field; mobile device security has become a major player amongst these agencies. Managing Iphones, Ipads, and Android devices is a task in itself let alone identifying proper...

Penetration Testing Process

Penetration testing is to hacking what the 100 meter sprint is to a multi-day adventure race. They both share a lot of the same goals, namely finishing first, and some of the same skills, such as running, but the differences far outweigh the similarities. Many people...