Friday, 19th April 2024.

Posted on Tuesday, 7th May 2013 by Michael

My first introduction to the Raspberry PI Many of you know me for my addiction to microcontrollers and creating some pretty cool projects. In the past I have focused solely on the Arduino microcontroller but recently with all the hype I been reading I had to get my hands on the Raspberry PI. I got […]

Posted in Papers | Comments (0)

Posted on Tuesday, 1st May 2012 by Michael

Phishing Attacks and Defense Recently I was able to speak at the PA Hackers first meet up (http://www.pahackers.com). My topic for this meet up was Phishing Attacks and Defense. I even went as far as to provide a live demo using the SET (Social Engineering Toolkit). The talk had some bugs due to technical issues, […]

Posted in Papers | Comments (0)

Posted on Thursday, 15th March 2012 by Michael

Last February I had to study and re-certify for my SANS GCIH certification. The first time I took this test had been 4 years earlier after attending a SANS boot camp held in Las Vegas. My instructor at the time was Ed Skoudis. I got to say if you ever have the opportunity to take […]

Posted in Papers | Comments (4)

Posted on Thursday, 16th December 2010 by Michael

How to root the Droid version 2.3 code Tonight I got an OTA (over the air update) from code 2.1 to 2.3 and wouldn’t you know it broke my existing root. You would figure since rooting is now legal they would not touch files that don’t belong to them or change your security settings but […]

Posted in Papers | Comments (1)

Posted on Tuesday, 2nd November 2010 by Michael

Google Voice and Whistle Phone for free calls and a local DID on any SIP device With the latest round of rotating passwords from Magic Jack and no end in sight many are looking for other alternatives. I for one have started my own VoIP service after years of providing VoIP consulting services. I wanted […]

Posted in Papers | Comments (5)

Posted on Thursday, 12th August 2010 by Michael

Is your site truly secure if the little box says it is? Site verified secure! You see this on many sites out there. They all proudly display an image from a company saying that their site is scanned daily and has been determined secure. How many of these sites truly verify your site is secure? […]

Posted in Papers | Comments (0)

Posted on Monday, 2nd August 2010 by Michael

ADA: Asterisk Desktop Assistant by Diginum The Asterisk Desktop Assistant is a plug-in that allows you to be able to click on telephone numbers inside of Microsoft Office Products, Firefox and Thunder Bird. Once you click on the number it will ring your phone, once you answer it will then dial and connect you to […]

Posted in Papers | Comments (2)

Posted on Thursday, 10th June 2010 by Michael

MJSIP: Automating the Magic Jack SIP retrieval What is it: MJSIP is a simple Perl script written by a co-worker and myself. This script uses regular expression matching to automate the finding of your SIP password in the dump file. MJSIP has been tested on over 50 Jacks that were purchased and registered this month […]

Posted in Papers | Comments (27)

Posted on Wednesday, 9th June 2010 by Michael

Can you pop me now? Like most programs Asterisks offers the ability to launch system commands from with inside the application. This means it is possible for either a developer or a malicious person to execute system commands by simply editing the dial plan and making a phone call. This is nothing new the ability […]

Posted in Papers | Comments (0)

Posted on Wednesday, 5th May 2010 by Michael

Overcoming SIP over NAT On most of the Asterisk based PBX forums on the internet one of the top help related questions posted is “the phone rings and I can answer it but there is no voice” or one of many variants of that question. The issue is most likely due to the fact you […]

Posted in Papers | Comments (1)

About Consulting Store