All information exposed in this blog has the goal to teach you the techniques used by the hackers in order to avoid their attacks. The idea of my blog is: Hacking while you're asleep to protect you when you're wake up.
If you want to learn hacking techniques to attack systems without authorization, stole data, etc... please get out of my blog right now.
All content of my blog is focused to share my years of experience protecting to my clients of the hackers and the pest of the malware.
It is your responsibility if you decide to use the information of this blog to make illegal actions. If you do that, you will be in jail.
I am a security IT administrator expert in network security and ethical hacker.
You can contact me at javier.nieto [ at ] behindthefirewalls . com
About Me
Popular Posts
-
When I was writing Using robots.txt to locate your targets , I felt the necessity of developing a tool to make automatic the task of auditi...
-
Some months ago, I participated in something like a "Hacker Competition" to get a job in a CERT. One of the tests consisted of g...
-
Cuckoo v1.0 was published some months ago but some time has passed since I've had time to install it with my friend cor3dump3d , who ha...
-
Kippo features A few months ago I could get access to a SSH Honeypot called Kippo. Kippo is designed to log SSH brute force attacks and ...
-
In the previous post we talked about how to resolve the exercises 1, 2 and 3 of the XSS-game proposed by Google. Now, we are going to res...
Behind The Firewalls. Powered by Blogger.
