No Recent Activity
About Godwin Austin

Basic Information

About Godwin Austin
Occupation:
Nuff said !

Signature


Fairy tales do not tell children the dragons exist. Children already know that dragons exist. Fairy tales tell children the dragons can be killed

Statistics


Total Posts
Total Posts
46
Posts Per Day
0.01
General Information
Last Activity
03-18-2015 02:41 PM
Join Date
07-08-2010
Referrals
1

5 Friends

  1. 1.4m.1nd14n 1.4m.1nd14n is offline

    Garage Newcomer

    1.4m.1nd14n
  2. b0nd b0nd is offline

    ... I am no Expert b0nd.g4h@gmail.com

    b0nd
  3. micr0 micr0 is offline

    Garage Newcomer

    • Send a message via Yahoo to micr0
    • Send a message via Skype™ to micr0
    micr0
  4. neo neo is offline

    InfoSec Consultant

    • Send a message via Yahoo to neo
    neo
  5. Shanthan Shanthan is offline

    Garage Newcomer

    Shanthan
Showing Friends 1 to 5 of 5
View Godwin Austin's Blog

Recent Entries

Collective Intelligence Framework Ė An awesome and pretty useful project

by Godwin Austin on 03-18-2015 at 02:38 PM
Hello Hackers!

How are you doing?
I am here today to shed some light on a nice and open source project called Collective Intelligence Framework (CIF).

About 70 % of internet traffic is Ö. Wait for it Ö. SPAM! If you donít believe me, install a service honeypot, give it about 10 minutes and then see the magic. Or get your machine direct public interface and start TCPDump.

The internet if full of crap / awesome stuff (in the eye of the beholder) like exploit

Read More

Categories
Uncategorized

Why do we love penetration testing (And you should too!)

by Godwin Austin on 08-14-2014 at 04:16 PM
Aloha readers!

Why do we love penetration testing? The question could be either answered in a couple of words or a book can be written on the topic. But for the sake of sanity, letís stick to a few words. For the muggles reading this post, here is the definition of penetration testing.

ďA penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality

Read More

Categories
Uncategorized