Errant Security
I get a lot of people with a CISSP after their email signature who say “wHy bLock DomAin NamEs or Ip AdDREsses, THey are JusT gonNa PiVOt”. While true, there is more to just switching network expl...
Sometimes I wish I could see into the brain of my close friend, John Hammond. Actually, Caleb too. Since they are just both way smarter than I am when it comes to this stuff. John loves to teach; ...
One awesome penetration testing and post-exploitation tool is PowerShell Empire. It offers a handful of modules and attacks to use on Windows hosts, and it is super handy as a Red Teamer (an indivi...
Get this. Im working on a compliance assesment and i find myself on a RHEL server that i have comprmised a local administrator password to. Nothing fancy, guessed a password based on the name of t...
Once you get to a certain point in mathmatics education, you tend to just give up and hit the I believe button. At least, thats how it was for me in my first Signal Processing class as an undergrad...
Most people have heard of VPNs as a method of masking one’s traffic, espically with NORD and some others heavy marketing campaigns. Most people arent aware of other ways to redirect traffic from on...