Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.
Monday, March 31, 2014
HACKBATTLE 2013 FULL EMAIL RECON BY TEAM OWNERZ
This is how Team OwnErz were able to initiate conversation with Joan and Daniella
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. The information is for educational use only.
Search This Blog
Kenyan Information Security Mailist Archives
MY BEST LINKS
If you wish to join, log in to, http://lists.my.co.ke/cgi-bin/mailman/listinfo/security