Research

Netragard: Connect to chaos

By |2020-03-31T10:30:20-04:00January 16th, 2011|

The Chevy Volt will be the first car of its type: not because it is a hybrid electric/petrol vehicle, but because GM plans to give each one the company sells its own IP address. The Volt will have no less than 100 microcontrollers running its systems from [...]

Comments Off on Netragard: Connect to chaos

Netragard’s thoughts on Pentesting IPv6 vs IPv4

By |2020-03-31T10:30:26-04:00January 14th, 2011|

We’ve heard a bit of “noise” about how IPv6 may impact network penetration testing and how networks may or may not be more secure because of IPv6.  Lets be clear, anyone telling you that IPv6 makes penetration testing harder doesn’t understand the first thing about real [...]

Comments Off on Netragard’s thoughts on Pentesting IPv6 vs IPv4

Hacking your car for fun and profit.

By |2020-03-31T10:32:38-04:00January 7th, 2011|

Our CEO (Adriel Desautels) recently spoke at the Green Hills Software Elite Users Technology Summit regarding automotive hacking. During his presentation there were a series of reporters taking photographs, recording audio, etc.   Of all of the articles that came out, one in particular caught our [...]

Comments Off on Hacking your car for fun and profit.

Fox 25 News Interview

By |2020-03-31T10:33:33-04:00November 11th, 2010|

Our (Netragard's) founder and president (Adriel Desautels) was recently interviewed by the local news (Fox 25) about car hacking.  We thought that we'd write a quick entry and share this with you. Thank you to Fox 25 for doing such a good job with the interview. [...]

Comments Off on Fox 25 News Interview

That nice, new computerized car you just bought could be hackable

By |2020-04-07T12:26:04-04:00August 31st, 2010|

Link: http://news.cnet.com/8301-27080_3-20015184-245.html Of course, your car is probably not a high-priority target for most malicious hackers. But security experts tell CNET that car hacking is starting to move from the realm of the theoretical to reality, thanks to new wireless technologies and evermore dependence on computers [...]

Comments Off on That nice, new computerized car you just bought could be hackable

Bypassing Antivirus to Hack You

By |2020-03-31T10:34:06-04:00August 6th, 2010|

Many people assume that running antivirus software will protect them from malware (viruses, worms, trojans, etc), but in reality the software is only partially effective. This is true because antivirus software can only detect malware that it knows to look for. Anything that doesn’t match a [...]

Comments Off on Bypassing Antivirus to Hack You

Security Vulnerability Penetration Assessment Test?

By |2020-03-31T10:34:14-04:00June 14th, 2010|

Our philosophy here at Netragard is that security-testing services must produce a threat that is at least equal to the threat that our customers are likely to face in the real world. If we test our customers at a lesser threat level and a higher-level threat [...]

Comments Off on Security Vulnerability Penetration Assessment Test?

We Are Politically Incorrect

By |2020-03-31T10:34:48-04:00June 11th, 2010|

Back in February of 2009 we released an article called FaceBook from the hackers perspective. As far as we know, we were the first to publish a detailed article about using Social Networking Websites to deliver surgical Social Engineering attacks. Since that time, we noticed a [...]

Comments Off on We Are Politically Incorrect

REVERSE(noitcejnI LQS dnilB) Bank Hacking

By |2020-03-31T10:34:57-04:00May 16th, 2010|

Earlier this year we were hired to perform an Overt Web Application Penetration Test for one of our banking customers (did you click that?).This customer is a reoccurring customer and so we know that they have Web Application Firewalls and Network Intrusion Prevention Systems in play.We [...]

Comments Off on REVERSE(noitcejnI LQS dnilB) Bank Hacking

Exploit Acquisition Program – More Details

By |2020-03-31T10:37:47-04:00March 28th, 2010|

The recent news on Forbes about our Exploit Acquisition Program has generated a lot of interesting speculative controversy and curiosity. As a result, I've decided to take the time to follow up with this blog entry. Here I'll make a best effort to explain what the [...]

Comments Off on Exploit Acquisition Program – More Details