Nov 15, 2014 A different kind of birthday attack Considering how many people actually use their birthday as their ATM pin, this is bad from a security standpoint. Tags: Security Similar Articles Intelligence-led Red Teaming - When conducting Red Team attacks, I believe it is important to use an intelligence-led approach when doing scenario planning. This is sometimes also known as threat actor emulation. Such an ... Facebook Open Graph Tags Modification - A couple of weeks ago, I discovered that Facebook allowed you to change the title and description of links that you post. This allows you to craft some pretty interesting posts. For example: ... Bank Token Teardown - My hardware token ran out of battery recently. Before throwing it out, I opened it up to remove the battery so I can dispose of it separately. I decided to take the opportunity to sneak a quick ... NTFS Owner Rights for Logging - I recently stumbled across the NTFS Owner Rights security principal. This is an obscure security principal that is used to restrict the rights that the owner of the file has. This can come in ...