enumeration

Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk
Richi Jennings | | access management, ASX:360, Chris Hulls, content scraping, data scraping, enumeration, Enumeration Attacks, Ex-Employee Credentials, geofencing and location tracking, geolocation, Identity & Access Management, identity and access management, Identity and Access Management (IAM), Life360, Location, location data, Location data privacy, location finder app, location history, location intelligence, location privacy, location sharing location tracking, preventing possible attempt to enumerate users, SB Blogwatch, scraper, Scrapers, Scraping, Tile, user enumeration
Location tracking service leaks PII, because—incompetence? Seems almost TOO easy ...
Security Boulevard

Active Reconnaissance: Overview, Methodology and Tools
Andy H | | active reconnaissance, Cybersecurity, enumeration, kill-chain, passive measurement, Security Concepts, security strategy, vulnerability scanning
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,… The post Active Reconnaissance: Overview, Methodology and ...

Ruby and OpenSSL Based SSL Cipher Enumeration
In this post, we will write our bare bones Ruby based SSL cipher enumerator to enumerate SSL cipher suites supported by a webserver. Without further delay, lets get started.Basics:The first step of ...