Errant Security
I get a lot of people with a CISSP after their email signature who say “wHy bLock DomAin NamEs or Ip AdDREsses, THey are JusT gonNa PiVOt”. While true, there is more to just switching network expl...
Sometimes I wish I could see into the brain of my close friend, John Hammond. Actually, Caleb too. Since they are just both way smarter than I am when it comes to this stuff. John loves to teach; ...
After you’ve competed in enough Capture the Flag events, you begin to get a feel for the different types of challenges that are thrown at you. The standard categories are Cryptography, Web Exploita...
One awesome penetration testing and post-exploitation tool is PowerShell Empire. It offers a handful of modules and attacks to use on Windows hosts, and it is super handy as a Red Teamer (an indivi...
3 hours into the night. I find myself bored as shit. I was covering my buddies shift in the SOC since he had plans with his girlfriend. There were no events going on. No active incidents. No emails...
The worst feeling in the world for me is knowing exactly how do to something, but being limited by some tool or peculiar reason. It happens to me a lot when working on electronics and trying to lay...
If you have ever cursed at your keyboard after setting your elbow on the shift key for time you can blame the “sethc.exe” executible. Its an ease of use feature built into windows for those who mig...
Get this. Im working on a compliance assesment and i find myself on a RHEL server that i have comprmised a local administrator password to. Nothing fancy, guessed a password based on the name of t...
Once you get to a certain point in mathmatics education, you tend to just give up and hit the I believe button. At least, thats how it was for me in my first Signal Processing class as an undergrad...
Most people have heard of VPNs as a method of masking one’s traffic, espically with NORD and some others heavy marketing campaigns. Most people arent aware of other ways to redirect traffic from on...