Archive for warfare

You are browsing the archives of warfare.

Evil Mouse Penetration Tool

Netragard’s Hacker Interface Device (HID) – [] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]

OODA Loops

Background – OODA loops are an abstract description of the flow involved in conflict cycles, as described by Col. John Boyd of the US Air Force. He developed the theory while flying fighter planes in dog fights, but later generalized it to apply to any form of conflict. OODA stands for Observe, Orient, Decide, Act. […]