Sunday, November 29, 2015

Vulnerable Images

No comments :
Starting a list to track sites where you can download vulnerable images to learn and for research purposes NameWebsite   VulnHubhttps://www.vulnhub.com/ Hackerdomhttp://ftp.hackerdom.ru/ctf-images/ ...
Read More

Sunday, November 8, 2015

Information Security Conferences

No comments :
Just a list to start tracking InfoSec Conferences I become aware of: Event NameGeneral ThemeLast Known DatesWebsite/EmailStatusCTFs   BloomCONForensics and SecurityFebruary 5-6, 2016OverYes nullconLatest attacks, exploits, and vulnsMarch 11-12, 2016nullcon.netAttendee...
Read More

Wednesday, June 25, 2014

We've Found No Evidence...Means What Exactly?

1 comment :
For its part, LexisNexis confirmed that the compromises appear to have begun in April of this year, but said it found “no evidence that customer or consumer data were reached or retrieved,” via the hacked systems. The company indicated that it was still in the process of investigating...
Read More

Thursday, June 12, 2014

BackTrack 5r3: Make it a Team Effort

No comments :
Background In October 2012, I was prepping for our finals round in the Global CyberLympics competition (where we took 2nd place). From previous practice sessions, my team and I agreed the best way to distribute information rapidly (and visually) among team members was to use Armitage's...
Read More

Friday, April 18, 2014

Write-Up: [SOLVED] SANS Easter Challenge - The Mystery of the Missing Easter Bunny

1 comment :
WARNING Complete spoilers ahead!  If you want to try the challenge first on your own, do not read this post.  You've been warned. Bunny-Napped! Scenario: The Easter Bunny has been kidnapped, and YOU have to save him! Quickly collect yourself and help save him. Put...
Read More

Tuesday, April 1, 2014

Spring Cleaning the Security Settings

No comments :
Clean Up Those Security Settings! I Decided did at a minimum each Spring I would endeavor to review my security settings across websites, apps, browser, and devices to make sure all security switches were enabled to the fullest extent possible. I'm posting this entry as a cheat...
Read More

Friday, March 21, 2014

Packet Analysis 101 - Wireshark's Packet Details

1 comment :
"The time has come," the Walrus said, "To talk of many things: Of bits-and bytes-and frame headers-- Of trace routes-and pings... You've already seen how to use Wireshark to take a packet capture, how to set capture filters, and how to set display filters.  In this post, we're...
Read More