Sunday, November 29, 2015
Labels:
CTF
,
Information Security
Read More
Vulnerable Images

Starting a list to track sites where you can download vulnerable images to learn and for research purposes
NameWebsite
VulnHubhttps://www.vulnhub.com/
Hackerdomhttp://ftp.hackerdom.ru/ctf-images/
...
Sunday, November 8, 2015
Labels:
Conferences
,
CTF
,
forensics
,
Information Security
Read More
Information Security Conferences

Just a list to start tracking InfoSec Conferences I become aware of:
Event NameGeneral ThemeLast Known DatesWebsite/EmailStatusCTFs
BloomCONForensics and SecurityFebruary 5-6, 2016OverYes
nullconLatest attacks, exploits, and vulnsMarch 11-12, 2016nullcon.netAttendee...
Wednesday, June 25, 2014
Labels:
data breach
,
disclosure
,
opinion
,
reporting standards
Read More
We've Found No Evidence...Means What Exactly?

For its part, LexisNexis confirmed
that the compromises appear to have begun in April of this year, but said
it found “no evidence that customer
or consumer data were reached or retrieved,” via
the hacked systems. The company indicated that it was still in the process
of investigating...
Thursday, June 12, 2014
Labels:
back track 5
,
metasploit
,
postgresql
Read More
BackTrack 5r3: Make it a Team Effort
Background
In October 2012, I was prepping for our finals round in the Global CyberLympics competition (where we took 2nd place).
From previous practice sessions, my team and I agreed the best way to distribute information rapidly (and visually) among team members was to use Armitage's...
Friday, April 18, 2014
Labels:
CTF
,
forensics
Read More
Write-Up: [SOLVED] SANS Easter Challenge - The Mystery of the Missing Easter Bunny
WARNING
Complete spoilers ahead! If you want to try the challenge first on your own, do not read this post. You've been warned.
Bunny-Napped!
Scenario: The Easter Bunny has been kidnapped, and YOU have to save him! Quickly collect yourself and help save him. Put...
Tuesday, April 1, 2014
Labels:
security
Read More
Spring Cleaning the Security Settings

Clean Up Those Security Settings!
I Decided did at a minimum each Spring I would endeavor to review my security settings across websites, apps, browser, and devices to make sure all security switches were enabled to the fullest extent possible. I'm posting this entry as a cheat...
Friday, March 21, 2014
Labels:
packet analysis
,
Wireshark
Read More
Packet Analysis 101 - Wireshark's Packet Details

"The time has come," the Walrus said,
"To talk of many things:
Of bits-and bytes-and frame headers--
Of trace routes-and pings...
You've already seen how to use Wireshark to take a packet capture, how to set capture filters, and how to set display filters. In this post, we're...
Subscribe to:
Posts
(
Atom
)