by admin | Jan 22, 2013 | Blog
It’s been a little over a year and a half ago the FBI seized servers leased by the once predominant file sharing service Megaupload, shutting down roughly 25 petabytes of data. The FBI targeted Megaupload (soon to be re-launched and re-branded as... by admin | Sep 10, 2012 | Blog
Network scanning starts as a simple task… nmap -oA target Unfortunately, it quickly turns into a complicated endeavor requiring a combination of automation, manual tuning, intuition, and discipline. Here are a few gotchas we regularly run into and try to solve.... by admin | Jun 18, 2012 | Blog
This video shows the process of gaining root access to a web server by hacking the web application, performed by Aerstone’s lead penetration tester Curt Stapleton. The demo covers discovery, mapping the app, defeating the login, elevating privileges, and... by admin | May 25, 2012 | Blog
Government agencies that would like to make the switch from blackberry devices to Iphone and Android not only have to worry about how to manage and certify them, but also which brand loyalty to sign on to. Starting off with android, Google has made it clear that they... by admin | May 11, 2012 | Blog
With Local, State and Federal agencies assigning their workforce mobile devices in the field; mobile device security has become a major player amongst these agencies. Managing Iphones, Ipads, and Android devices is a task in itself let alone identifying proper... by admin | Apr 5, 2012 | Blog
Penetration testing is to hacking what the 100 meter sprint is to a multi-day adventure race. They both share a lot of the same goals, namely finishing first, and some of the same skills, such as running, but the differences far outweigh the similarities. Many people...