Tab Content
No Recent Activity
About the_empty

Basic Information

About the_empty
Biography:
i am me
Location:
the blue no-where
Interests:
amusement..
Occupation:
info sec consultant

Signature


ACCESS is GOD

Statistics


Total Posts
Total Posts
155
Posts Per Day
0.05
General Information
Last Activity
10-13-2018 12:08 PM
Join Date
07-08-2010
Referrals
3

6 Friends

  1. 5j05h1 5j05h1 is offline

    Garage Newcomer

    5j05h1
  2. c0dist c0dist is offline

    Garage Member

    c0dist
  3. D4rk357 D4rk357 is offline

    Garage Member

    D4rk357
  4. r00t3d r00t3d is offline

    Garage Newcomer

    r00t3d
  5. shrikant.bhade shrikant.bhade is offline

    Garage Newcomer

    shrikant.bhade
  6. swatantra swatantra is offline

    Garage Newcomer

    swatantra
Showing Friends 1 to 6 of 6
View the_empty's Blog

Recent Entries

Top 7 “Things” Every Penetration Tester Should Use

by the_empty on 08-17-2014 at 04:03 PM
After a long time pinning something down. Disclaimer: Views are mine, based on my experience and knowledge, suggestions to improvise would be appreciated.

So, Penetration testing, with information security getting closer to become the center of the world, pentesting has become integral part of our lives. The life of security folks. No matter how many times you secure the network, it manages to get back in jeopardy. Sometimes we just want it to stay secure. So the pentest to the rescue

Read More

Updated 08-17-2014 at 04:08 PM by the_empty

Categories
Uncategorized

Story of a PoC - F5 BIG-IP Cookie Information Disclosure

by the_empty on 08-26-2010 at 07:08 PM
Quote Originally Posted by the_empty View Post
Curiosity is the biggest virtue of a hacker’s mindset. Only because curiosity people like me loose focus of the actual target and run behind the OTHER things. (Anyways, they are more interesting)

Similar thing happened while I was Pen testing some Web servers which were running behind a load balancer. Nessus was showing some vulnerability associated with load balancer through which it was able to figure out the internal IP of the target server. I read about the vulnerability but was

Read More

Categories
Uncategorized