Tutorial
Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations
You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash ...
Hardware Hacking 101 – Lesson 2: Classical Hardware Hacking
Welcome back to our ongoing series on hardware hacking and our second lesson. Last month we presented “Lesson 1: Beauty, Your Home Lab and Basic Electronics” with an appreciative nod to this ...
Ease Me Into Cryptography Part 3: Asymmetric Ciphers
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how ...
Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics
Hardware hacking is one of those subjects that a lot of hackers appear to have great interest, but most don't act on that interest. There are a variety of reasons why this ...
From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt
While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking ...
Ease Me Into Cryptography Part 2: Symmetric Ciphers
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects ...
A ‘How To’ for Asset Tagging
The systems in your environment are extremely important assets. Storing intellectual property, customer information, financial information, business automation, etc. If any of these systems are breached or become unavailable, there is a ...
WeirdAAL (AWS Attack Library) Basics from the Authors
The cloud is everything. Organizations have either moved completely to the cloud, have a hybrid approach, or are actively planning a cloud strategy. Penetration testers have always had to provide their services ...
Hacking Retro
Bring out your disco ball, your leg warmers, and your VHS tapes! While a lot of us watch the VH1 hit “I Love the 80s” for pop culture, I’m always drawn to ...
Windows Privilege Escalation – Unquoted Services
So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your privileges by ...