Blog

  • Pentesting Blazor web applications with the Crimson Blazor Decoder

    Good security testing starts with one question: what is this application actually doing? The Crimson Blazor Decoder answers that for Blazor Server applications in ZAP.

    blazor zap security-testing websocket decoder
  • When the Cat Walks Past Twice: An Argument for Vibe Coding Security Engineering

    An exploration of vibe coding in security engineering — when intuition trumps process and the cat walks past twice.

    vibe-coding ai security
  • The use of Telnet in the year 2020

    In 1969 the groundbreaking RFC 15 was published describing a protocol known as Telnet. Telnet was used for many years to remotely log into systems. One of the amazing things about Telnet is its...

  • The maliciousness of malware

    At Crimson Wall we recently performed an interesting malware experiment. We downloaded thousands of malware applications, ran them and documented their behaviour. The results obtained were in some...

  • The password strength illusion

    Earlier this year we saw massive password databases released onto the dark web. These databases were more extensive than any of the databases leaked before. In January a password database called...

    Brute-force Dataset Password security
  • Wireless keyboard problems

    Wireless keyboards are often used in office environments due to their convenience. Wireless keystrokes are transmitted by the keyboard to a wireless receiver that feeds the keystrokes to a computer....

    Logitech Sniffing Wireless keyboard
  • Accepting attachments from strangers

    Ransomware and trojan horses are often delivered to unsuspecting users as e-mail attachments. Once activated, such malware can cause excessive damage on the computer where the malware was activated,...

    malware ransomware spam
  • Phishing wars: A tale of hope, with a twist

    In modern times phishing is a harsh reality. Phishing has come a long way from the simplistic Nigerian Prince type scams that once filled up our inboxes. Phishing has grown tremendously in...

    Phishing