877.791.9571 |

About the Author:

Azim Poonawala is a security researcher for InfoSec Institute. He is the Founder of Closed Circuit Corporate Clandestine [C4] (http://www.c-4.in) and holds a Masters in Information Technology.

He has has worked for companies like Hewlett Packard, Mahindra and Mahindra, the Bombay Stock Exchange, Perimeter USA and clients from the U.S. financial industry to the U.S. Government and has extensive experience in strengthening and breaking systems.

Poonawala is the source craftsman of the winAUTOPWN exploit framework and the FBController. He specializes in covert red team network penetration, cyber-attacks and development of custom code aimed at special objectives. In addition, he crafts tools contributing to the industry via his blog Moving Towards Normality (http://my.opera.com/quakerdoomer) and his website (http://solidmecca.co.nr).

The Enderground: The Last Meeting – Chapter One

The sharp short sound of a black agent hibernating his Laptop’s OS echoed in the room. The box banged shut making the screen and the keypad kiss each other. […]

Attacking the Phishers: An Autopsy on Compromised Phishing Websites

In this article we will cover the results of an informal investigation I performed into phishing websites.
Rather than simply reviewing them externally as a potential phishing victim would, I […]

Automated Vulnerability Testing with winAUTOPWN


What is winAUTOPWN?
winAUTOPWN is a minimal Interactive Exploit Framework which acts as a frontend for quick systems vulnerability exploitation. It is a collection of remote exploits using which one […]