The New Phish
Scams and phishing are continually getting more creative, and today I came across one phishing attack that really kinda amazed me. The attack uses a legitimate Microsoft login pag…
Read more →// essentialexploit.com
Hacker, Bug Hunter, and all round Geek/Nerd. Documenting exploits, CTF write-ups, and security research.
Scams and phishing are continually getting more creative, and today I came across one phishing attack that really kinda amazed me. The attack uses a legitimate Microsoft login pag…
Read more →A few months ago registration for BlackHat USA19 kicked off, and for the third year in a row I just missed getting into Offensive Security’s Advanced Web Attacks and Exploitation (…
Read more →So I have never done write-ups for CtF's before but I am taking the information that I have and putting it all together in some posts. This post and CtF posts before this date are…
Read more →SANS puts on KringleCon and I have to say not only was it fun but some of it really made me think. I made it to the end of this one but yet once again … I am writing this way, way…
Read more →This was the first CtF that I participated in that I actually kept files for. This was don back in late 2018 and here I am almost 4 months later trying to write about it ... yeah …
Read more →Hacker0x01 has a great CtF series that is just perfect for practicing. Although it would not be fair to release findings as there are h1 private invites being awarded for the comp…
Read more →Recent news of the Verizon data leak http://www.darkreading.com/cloud/verizon-suffers-cloud-data-leak-exposing-data-on-millions-of-customers/ and a similar scenario concerning Dow …
Read more →RTL-SDR is a dirt cheap way to start playing with radio using the RTL2832U chipset. I like to do things right when I start a project so I decided to purchase a nice SDR hardware tr…
Read more →Well this is another old trick that still works today. It still gets past all edge security and antivirus … well that is until you pull the executable out again. I find myself us…
Read more →Let’s start off on the right foot shall we? I don’t want to be rude but – I am a computer geek, my writing skills are not so great. So if you don’t like the way I write just quit…
Read more →We have all faced the problem of transferring “malicious” or binary files through corporate firewalls or proxies when doing penetration tests. Previously the work around was quite…
Read more →https://github.com/RabbidByte/GFI2012-PrivilegeEscalation
Read more →1. an Alix board, CF, and enclosure 2. two ALPHA USB Wireless cards 3. a cell phone that you can tether to 4. mobile power solution
Read more →