• Stopping FTP Brute Force Attacks in FreeBSD and OpenBSD

    Stopping FTP Brute Force Attacks in FreeBSD and OpenBSD

    This is a great little article that I came across talking about stopping FTP brute force attacks in OpenBSD or FreeBSD (both of my favorite OS’s). It assumes that your using PF as your firewall (which you should!). You can easily stop bruteforce attacks by limiting connections per IP using pf firewall under FreeBSD or
    Read More…

  • How to Install Bro IDS 2.5 on Ubuntu 16.0x

    How to Install Bro IDS 2.5 on Ubuntu 16.0x

    I decided to write out the steps I took to for installing Bro IDS 2.5 on Ubuntu 16.0x. Before we begin installing Bro from source we need to make sure we have all the correct dependencies. On Ubuntu 16.0x you can run the following: sudo apt-get install cmake make gcc g++ flex git bison libpcap-dev
    Read More…

  • SkyDog Con 2016 CTF – Walk Through Guide

    SkyDog Con 2016 CTF – Walk Through Guide

    Download Link The VM is now available for download on Vulnhub at the link below. https://www.vulnhub.com/entry/skydog-2016-catch-me-if-you-can,166/ Instructions The CTF is a virtual machine and works best in Virtual Box. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you downloaded it. After importing
    Read More…

  • SkyDog Con CTF – The Legend Begins

    SkyDog Con CTF – The Legend Begins

    Sky Dog Con CTF – Over but not forgotten. Download Link http://bit.ly/SkyDogConCTF Instructions The CTF is a virtual machine and works best in Virtual Box. This OVA was created using Virtual Box 4.3.32. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you
    Read More…

  • Own Windows with PowerShell using Nishang

    Own Windows with PowerShell using Nishang

    Nishang is a framework and collection of scripts and payloads which enables usage of Windows PowerShell for offensive security and post exploitation during Penetraion Tests.  The scripts are written on the basis of requirement by the author during real Penetration Tests. PAYLOADS It contains many interesting scripts like download and execute, keylogger, dns txt pwnage,
    Read More…

  • FreeBSD pkg_add little trick

    FreeBSD pkg_add little trick

    So don’t ask me why but I decided to run FreeBSD 6.0 on an older Dell Latitude laptop. Install goes fine. But now I’ve got an issue. When trying to install a package I get the troublesome ftp error (cannot find this location dummy). But this was quickly resolved with the following. You can also
    Read More…

  • Creative Structure is Key by Haruki Murakami

    Creative Structure is Key by Haruki Murakami

    There is a quote I read today by Haruki Murakami that really made me sit back and think about how I handle all my daily task and projects.  Especially with my obsession lately for absolute peak performance in my life. “When I’m in writing mode for a novel, I get up at four a.m. and
    Read More…

  • Defeating Tr0ll – Infosec Challenge Walkthrough

    Defeating Tr0ll – Infosec Challenge Walkthrough

    This is my walkthrough for defeating Tr0ll infosec challenge.  This is another great “boot2root” VM  that kept my guessing quite a few times.  It also made me focus more on fully utilizing some of the scripts and programs I generally use during a penetration test.  I also really liked the fact that Wireshark played a
    Read More…

  • Threat Hunting with Bro IDS

    Threat Hunting with Bro IDS

    This post is a quick look at how I personally use Bro IDS for threat hunting. Specifically some of the queries I run when I start a hunt by data set. A quick note on Bro. Bro IDS is a pretty amazing piece of software for threat hunting and my go to tool of choice.
    Read More…

  • Linux Memory Analysis: How to Start and What You Need to Know

    Linux Memory Analysis: How to Start and What You Need to Know

    Are you ready to dive into the exciting world of memory analysis?!? No? Well that’s too bad because you need to know it. There’s an old saying in InfoSec, “The packet doesn’t lie.” Well the same is true for memory analysis. It simply is what it is and because of that, can provide a wealth
    Read More…