An acquaintance recently dropped me a line asking for some help with a gig she was working on. After sharing the background about the work she had performed so far, she said something which made me promptly sit up and listen… “I have access to backups… Can we do anything with vmdk’s?”. Needless to say, […]
Last week, Justin Warner and Will Schroeder presented a talk at BSidesLV about a new post-exploitation framework called PowerShell Empire. The PowerShell Empire site describes the framework as “… a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable […]
Rainy weather can only mean one thing… VulnHub challenge time. Today’s menu @TopHatSec’s Freshly challenge. The goal of this challenge is to break into the machine via the web and find the secret hidden in a sensitive file. If you can find the secret, send me an email for verification. :) There are a couple […]
Wireless empowers us to conveniently participate in the modern “connect everything” age. Almost every household and business is running a wireless network of some form. We are addicted to the technology, which in turn has created a smoke haze of denial that wireless is secure. We choose the ignorant path, as we are all well […]
Sharing is caring as they say, and with that in mind I am going to start writing a series of posts introducing basic tips and tricks in the world of infosec. The purpose is to help share knowledge with folk interested in the infosec world, and is not intended to feed the ego of uneducated […]