Wednesday, June 25, 2014

We've Found No Evidence...Means What Exactly?

1 comment :
For its part, LexisNexis confirmed that the compromises appear to have begun in April of this year, but said it found “no evidence that customer or consumer data were reached or retrieved,” via the hacked systems. The company indicated that it was still in the process of investigating...
Read More

Thursday, June 12, 2014

BackTrack 5r3: Make it a Team Effort

No comments :
Background In October 2012, I was prepping for our finals round in the Global CyberLympics competition (where we took 2nd place). From previous practice sessions, my team and I agreed the best way to distribute information rapidly (and visually) among team members was to use Armitage's...
Read More

Friday, April 18, 2014

Write-Up: [SOLVED] SANS Easter Challenge - The Mystery of the Missing Easter Bunny

1 comment :
WARNING Complete spoilers ahead!  If you want to try the challenge first on your own, do not read this post.  You've been warned. Bunny-Napped! Scenario: The Easter Bunny has been kidnapped, and YOU have to save him! Quickly collect yourself and help save him. Put...
Read More

Tuesday, April 1, 2014

Spring Cleaning the Security Settings

No comments :
Clean Up Those Security Settings! I Decided did at a minimum each Spring I would endeavor to review my security settings across websites, apps, browser, and devices to make sure all security switches were enabled to the fullest extent possible. I'm posting this entry as a cheat...
Read More

Friday, March 21, 2014

Packet Analysis 101 - Wireshark's Packet Details

1 comment :
"The time has come," the Walrus said, "To talk of many things: Of bits-and bytes-and frame headers-- Of trace routes-and pings... You've already seen how to use Wireshark to take a packet capture, how to set capture filters, and how to set display filters.  In this post, we're...
Read More

HTTP Host Headers

No comments :
Why are Host Headers important? Host Headers are sent in the HTTP GET request to instruct the webserver to send content back for a specific website.  This is necessary for webservers that host multiple websites (think shared hosting), so the hosting server can match the content to the Host Header and serve up what website. Here's a video demonstrating multiple sites...
Read More

Wednesday, March 19, 2014

MACCDC 2014: Virtual Quals Lesson Learned

No comments :
MACCDC 2014 - Virtual Qualifier Round Some found my MACCDC 2013 write-up helpful, and more information is always better, so here's this year's lesson learned for the virtual qualifier round. Choose a later time slot This lesson is pretty subjective and I don't mean for it to...
Read More

Tuesday, March 18, 2014

MACCDC 2014: Sahana Eden Write-Up

No comments :
This year, I was tasked to a linux box, even though my greater strength is in Windows.  With the theme of this year's MACCDC being related to disaster recovery, I discovered the distro I had was Sahana Eden. The tl;dr of this part is that I recommend once you learn of...
Read More

Tuesday, February 18, 2014

Packet Analysis 101 - Wireshark Display Filters

No comments :
Now that you're familiar with capture filters, let's discuss display filters. It's a port scan! Display Filters Display filters can be applied during a live packet capture, as well as when reviewing an old packet capture like the one above (provided for the MDC3 forensics qualifying...
Read More

Friday, January 31, 2014

Packet Analysis 101 - Wireshark Capture Filters

No comments :
We're going to first discuss one of the two types of filtering available with Wireshark: capture filters.  Before I go any further, if you're confused about what filters are and/or what Wireshark is, check out my first blog post to learn how to take a packet capture. Capture...
Read More

Tuesday, January 28, 2014

Packet Analysis 101 - Initiating the Capture

No comments :
Let's Look at the Packets! How often have you heard, "This application isn't working.  Is it the [IPS/IDS/Proxy/Firewall] again?" Ten years ago, when someone couldn't check their email or perform a web-based task, it was always a question of whether the server was actually receiving...
Read More

Sunday, January 12, 2014

HTTPS, SSL, and [Perfect] Forward Secrecy

No comments :
The events of 2013 have raised awareness about the capability to eavesdrop on Internet conversations many thought were protected from eavesdropping.  There are many articles about HTTPS, SSL, and [Perfect] Forward Secrecy, but I've found that none really reference the information...
Read More