Canary – An Open Source Decoy
Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how […]
Part II: The Technicalities – Linux Kernels and chroots This is part 2 of building your own mobile pen-testing device. Here’s the link to part […]