The MegaUpload Shutdown, A Year Later by admin | Jan 22, 2013It’s been a little over a year and a half ago the FBI seized servers leased by the once predominant file sharing service Megaupload, shutting down roughly 25 petabytes of data. The FBI targeted Megaupload (soon to be re-launched and re-branded as...
Network Scanning Done Right by admin | Sep 10, 2012Network scanning starts as a simple task… nmap -oA target Unfortunately, it quickly turns into a complicated endeavor requiring a combination of automation, manual tuning, intuition, and discipline. Here are a few gotchas we regularly run into and try to solve....
Hacking a Web Application by admin | Jun 18, 2012This video shows the process of gaining root access to a web server by hacking the web application, performed by Aerstone’s lead penetration tester Curt Stapleton. The demo covers discovery, mapping the app, defeating the login, elevating privileges, and...
Should Agencies Choose One Device Over Another? by admin | May 25, 2012Government agencies that would like to make the switch from blackberry devices to Iphone and Android not only have to worry about how to manage and certify them, but also which brand loyalty to sign on to. Starting off with android, Google has made it clear that they...
Government Mobile Device Integration by admin | May 11, 2012 With Local, State and Federal agencies assigning their workforce mobile devices in the field; mobile device security has become a major player amongst these agencies. Managing Iphones, Ipads, and Android devices is a task in itself let alone identifying proper...
Penetration Testing Process by admin | Apr 5, 2012Penetration testing is to hacking what the 100 meter sprint is to a multi-day adventure race. They both share a lot of the same goals, namely finishing first, and some of the same skills, such as running, but the differences far outweigh the similarities. Many people...