hacking

Talk - The Exploited & the Exploiters

Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At Functional Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At Test Professionals Network Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At CHCH.js Christchurch, due to popular demand. Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.

Talk - 0wn1ng The Web

At WDCNZ: Kim discusses and demonstrates how JavaScript can be used for good and evil.

Workshop - Holistic Info-Sec for Web Developers

At CampJS, Melbourne, Australia: Join Kim in the exploration into an insightful set of steps he has learned, from an architectural perspective down to the zeros and ones. Also providing insights of how attackers of your systems think.

Up and Running with Kali Linux and Friends

Redirects to legacy blog post. In this article I’ll go over getting Kali Linux installed and set-up. I’ll go over a few of the packages in a low level of detail (due to the share number of them) that come out of the box. On top of that I’ll also go over a few programmes I like to install separately. In a subsequent article I’d like to continue with additional programmes that come with Kali Linux as there are just to many to cover in one go.