Skip to content
Primary Menu
  • Welcome 🚀
  • About Us ✨
    • Legacy Members
  • Blog 🤓
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Engineering
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • Special Interest
    • Technical Fundamentals
    • Web
  • Newsletter 🎉
  • Conferences 🎤
  • Merchandise 🛒
Security Queens

Welcome to our Blog!

Sarah

  • Home
  • Sarah
Category: Android/Mobile/Penetration Testing

Liability: Insecure Data Storage

Posted On 5 February 20215 February 2021 By Sarah1 Comment

Estimated difficulty: 💜💜💜🤍🤍 Oh no, it’s another one from the MOBster series coming to get you! Hide… Run… Read with intrigue! This post is covering, M2: Insecure Data Storage, the second listing from the OWASP Top 10 Mobile Risks list. The last post in the MOBster series covered M1: Improper Continue Reading

Category: OSINT

Santa Knows Everything… Part 2

Posted On 18 December 202018 December 2020 By Sarahcomment

Estimated difficulty: 💜🤍🤍🤍🤍 This week is special, it’s the last post before Christmas and we might as well channel our inner Sophia and add in a little Christmas song to get us into the Christmas spirit. And since we are now feeling festive, let’s dive into Google Dorking, Christmas style! Continue Reading

Category: Securiteenies/Uncategorized

Castle on a Cloud

Posted On 6 November 20206 November 2020 By Sarahcomment

Estimated difficulty: 💚💚🤍 It’s a wonder what is up in those clouds, clouds can mean many different things in this day and age. Clouds live in the sky, there is something called cloud computing and more importantly, (for this article) clouds can represent the internet – especially in a network Continue Reading

Category: Android/Mobile/Penetration Testing

What’s that coming over the hill? Is it a MOBster, is it a MOBster!?

Posted On 25 September 202025 September 2020 By Sarahcomment

Estimated difficulty: 💜💜💜💜🤍 Welcome back to the MOBster series! The last post I published, covered the different aspects of an APK file – otherwise known as an app. This post I want to take some of these principles a step further and look at the possible effects of a misconfigured Continue Reading

Category: Android/Mobile/Penetration Testing

What in the APK?!

Posted On 21 August 202021 August 2020 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 This week I wanted to write the first post of a mini mobile application reverse engineering series! There has been a lot of attention in the news about apps such as TikTok and the COVID-19 NHS track and trace app, where they have been shown to have Continue Reading

Category: Securiteenies

Pi Projects – Flashing Kali Linux

Posted On 31 July 20201 August 2020 By Sarah2 Comments

Estimated difficulty: 💚💚💚 Welcome to my first blog post for Securiteenies! We’ve created a difficulty rating based on a 3 heart system. Since the summer holidays have kicked off, we’d like to help you learn some fun skills over your lock-down break. This post was inspired by a question asking Continue Reading

Category: Mobile

How Does Your Mobile Communicate? The Generation Time Warp!

Posted On 10 July 202010 July 2020 By Sarahcomment

Estimated difficulty: 💜💜💜🤍🤍 In light of recent worries around 5G and its effects on the population (in particular the theory of it causing COVID-19), I thought I would try to demystify the cellular network generations and provide an understanding of how they have developed; in particular, focusing on the security Continue Reading

Category: Awareness

B3st Pass**rd Pr@ct!ces

Posted On 19 June 202019 June 2020 By Sarah2 Comments

Estimated difficulty: 💜🤍🤍🤍🤍 Passwords have been a form of securing your accounts for years. They are your key to unlock the door to your account for want of a better metaphor. You are the only person that should know your password, as the creator and keeper of this information. My Continue Reading

Category: Development

Dank Docker Development

Posted On 5 June 20205 June 2020 By Sarah2 Comments

Estimated Difficulty: 💜💜💜🤍🤍 I’m sure you have all heard the whispers that Security folk dislike the Developer folk… However, the time has come for the Security-Developer to be born! I don’t know about you, but I am all for making my life easier and after a dissertation full of failures, Continue Reading

Category: OSINT

Google knows everything… – Part 1

Posted On 8 May 20208 May 2020 By Sarahcomment

Estimated difficulty: 💜🤍🤍🤍🤍 This post is in collaboration with the infamous OSINT (Open Source INTelligence) hacker @thecyberviking. “Google knows everything… – Part 1” is but one post in a series of OSINT related topics created with the help of that spooky dude! This post on Google Dorking will focus on Continue Reading

Load More Posts
Socials

Copyright © All rights Reserved || Theme: Infinity Blog by Themeinwp