Untrusted, levels 18 - 20
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
In studying for my GWAPT I was introduced by Eric Conrad to a cool educational game called Untrusted, created by Alex Nisnevich and Greg Shuflin (sorry, Greg...
This post is a “living document,” intended for me to keep a quick-and-dirty reference sheet around at all times, rather than as a standalone post. It will be...
Cheat-sheet version:
I am in the process of migrating away from Ghost. Long/short, there is too much dynamic code, and the exposure makes me uncomfortable. I’ve discovered Jekyll...
I recently went through the first two levels of the free intro tutorial at JQuery in order to build some basic jQuery familiarity (more on why soon). Below a...
Cheat-sheet version
Cheat-sheet version: USER=$(whoami) cd /Users/${USER}/Library/Application\ Support/Steam/Steam.AppBundle/Steam/Contents/MacOS/public; ls *.res | while read l...
Cheat-sheet version: apt install fail2ban printf "[Init]\nblocktype = DROP" > /etc/fail2ban/action.d/iptables-blocktype.local service fail2ban restart
Cheat-sheet version: Download Oracle JRE.
This post is a “living document,” intended for me to keep a quick-and-dirty reference sheet around at all times, rather than as a standalone post. It will be...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
This post is a result of an email exchange between me and a young professional looking to get into IT security in general and penetration testing in particul...
So I found myself in an interesting (and strange) thread on Twitter, the other day. I’ll be using screenshots, and hopefully I won’t get replies out of order...
Part 4: Comparison of features and traits (continued) Rather than break sections up the way reviews often are (all about option 1, then all about option 2), ...
Part 3: Comparison of features and traits (continued) Rather than break sections up the way reviews often are (all about option 1, then all about option 2), ...
Now that I’ve gone over the background and the summary of my conclusions in part 1, this post will be to analyze various aspects of the offerings themselves....
These posts are to documement my overall experience with different password storage solutions, and an amateur evaluation that I performed from the perspectiv...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
I’ve been thinking lately about “the infosec community” because of some things I’ve read from folks on Twitter. Unlike my “DMs to myself,” posts, I’m not goi...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself in an effort not to lose interesting or valuable pieces...
I’ve been meaning to get these thoughts up on the blog for a bit, since transitioning from a self-hosted instance of Ghost to Jekyll-powered Github Pages. As...
As previously posted, I performed a migration from my prior setup, running Ghost, to this current setup using Jekyll as my content generator and hosting the ...
The current version of Ghost does not support image resizing, so the workaround for now is to use HTML tags with some CSS crammed in:
*Door slammed in face*
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself in an effort not to lose interesting or valuable pieces...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself in an effort not to lose interesting or valuable pieces...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself in an effort not to lose interesting or valuable pieces...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
Background Between February 2014 and February 2017, Vizio collected information about customer viewing habits through their Vizio Smart TVs, and sold that in...
I’m not a big fan of Facebook due to numerous privacy concerns. I’ve gone back and forth on the subject of closing my account for some time, but as yet still...
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I’ve been meaning to get these thoughts up on the blog for a bit, since transitioning from a self-hosted instance of Ghost to Jekyll-powered Github Pages. As...
As previously posted, I performed a migration from my prior setup, running Ghost, to this current setup using Jekyll as my content generator and hosting the ...
Well, that took longer than planned.
I’ve been meaning to get these thoughts up on the blog for a bit, since transitioning from a self-hosted instance of Ghost to Jekyll-powered Github Pages. As...
As previously posted, I performed a migration from my prior setup, running Ghost, to this current setup using Jekyll as my content generator and hosting the ...
Well, that took longer than planned.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
Deja vu One of my earlier posts described how to make the Steam client work on Mac OSX. That was pre-High Sierra, and all that was needed back then was renam...
Cheat-sheet version: USER=$(whoami) cd /Users/${USER}/Library/Application\ Support/Steam/Steam.AppBundle/Steam/Contents/MacOS/public; ls *.res | while read l...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
This is my first blog entry.
Cheat-sheet version: Download Oracle JRE.
I finally picked up a Wii U since the price has come down a bit and I’m hankering to play Breath of the Wild. Hooked it up to my TV + 5.1 surround sound rece...
Cheat-sheet version: apt install fail2ban printf "[Init]\nblocktype = DROP" > /etc/fail2ban/action.d/iptables-blocktype.local service fail2ban restart
Cheat-sheet version
Another instance of documentation that wasn’t fully explanatory or didn’t work. I got my SNMPv3 set up succesfully using the following in /etc/snmp/snmpd.con...
If, like me, you have ever wondered what those little brushes along the sides of escalators are for, read on. Be warned, however: The information that follow...
Maybe get the name right?
Immediately after I submitted a comment to Dr. Neal Krawetz’s Hacker Factor blog, I realized I had misunderstood and overlooked some important details of dif...
I ran into an issue with the site over the weekend that, in hind sight, I should have avoided.
Well, that took longer than planned.
Cheat-sheet version:
Cheat-sheet version:
Cheat-sheet version:
I’m not a big fan of Facebook due to numerous privacy concerns. I’ve gone back and forth on the subject of closing my account for some time, but as yet still...
I’m not a big fan of Facebook due to numerous privacy concerns. I’ve gone back and forth on the subject of closing my account for some time, but as yet still...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
You talkin’ to me? So there I was, minding my own business, checking my emails, when suddenly, a wild phishing attempt appears!
You talkin’ to me? So there I was, minding my own business, checking my emails, when suddenly, a wild phishing attempt appears!
Deja vu One of my earlier posts described how to make the Steam client work on Mac OSX. That was pre-High Sierra, and all that was needed back then was renam...
rtlamr Sometimes the instructions don’t register, the way they are laid out.
rtlamr Sometimes the instructions don’t register, the way they are laid out.
I’ve been thinking lately about “the infosec community” because of some things I’ve read from folks on Twitter. Unlike my “DMs to myself,” posts, I’m not goi...
I’ve been thinking lately about “the infosec community” because of some things I’ve read from folks on Twitter. Unlike my “DMs to myself,” posts, I’m not goi...
I’ve been thinking lately about “the infosec community” because of some things I’ve read from folks on Twitter. Unlike my “DMs to myself,” posts, I’m not goi...
Background Between February 2014 and February 2017, Vizio collected information about customer viewing habits through their Vizio Smart TVs, and sold that in...
Background Between February 2014 and February 2017, Vizio collected information about customer viewing habits through their Vizio Smart TVs, and sold that in...
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Spoiler: There is no quick answer to this. I’m a details guy. This won’t be short.
Spoiler: There is no quick answer to this. I’m a details guy. This won’t be short.
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...