The author of the blog is an Information Security BSc (Hons) graduate / Crest Certified Security Test Associate who is enthusiastic about methods of exploiting systems and mitigating attacks.

This blog will serve as an outlet for publishing research which has been conducted within the home Lab, providing the reader with technical and practical information for reproducing these attacks within their own sandboxed environment.

The motivation behind this blog is that whilst conducting research for the BSc degree it was found that there was a lack of information which provided both technical and practical within the same outlet. Many of the details needed were found over many web sites / books, this blog aims to fuse both of these allowing the reader a one stop drop for information regarding to attacks and methods of reducing the attack surface area.

The blog will be broken into different areas such as Wi-Fi Hotspots, System Attack etc, attacks will be discussed as well as a guide to take the reader through each of the steps to initiate the attacks. Once the attacks have been discussed the final posts within the subject will focus on reducing the likeliness of these attacks from occurring, allowing the reader to not only understand how the attacks are performed but also mitigation strategies. It is important to understand both sides of the procedure since Information Security is not all about exploiting systems but ensuring the CIA (Confidentiality, Integrity, Availability), of the systems and the data stored on them.

I hope that the readers of this blog enjoy the information and tutorials provided, feedback is always welcome good or bad it will aid in the production of the blog and its content.


Gary Morgan BSc (Hons), CSTA.

Information Security BSc (Hons) | Crest Certified Security Test Associate | Member of the British Computer Society


To reiterate, this blog is not a hacking site nor does the author condone blackhat attacks on organisations, establishments or individuals. This blog is provided for educational purposes only ! Enabling computer security enthusiasts / students to further their research and provide practical guides to help individuals. The author does not take any responsibility for any actions taken from individuals who have read information within this blog and used the knowledge for malicious use.

Penetration testing / ethical hacking should only be conducted on systems where consent has been granted. It is illegal within many countries around the world to gain access to systems without authorisation.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s