• How to Install Bro IDS 2.5 on Ubuntu 16.0x

    How to Install Bro IDS 2.5 on Ubuntu 16.0x

    I decided to write out the steps I took to for installing Bro IDS 2.5 on Ubuntu 16.0x. Before we begin installing Bro from source we need to make sure we have all the correct dependencies. On Ubuntu 16.0x you can run the following: sudo apt-get install cmake make gcc g++ flex git bison libpcap-dev
    Read More…

  • Threat Profile: Killer Swag

    Threat Profile: Killer Swag

    Introduction I’ve been monitoring an interesting threat for the past several days, a group I’m referring to as “Killer Swag”. Mainly because the initial dropper is called “Swag.sh” and “Killer Swag” just sounds cool. In another life I think I would have been a marketing genius, but I digress. This post will cover my research
    Read More…

  • Creative Structure is Key by Haruki Murakami

    Creative Structure is Key by Haruki Murakami

    There is a quote I read today by Haruki Murakami that really made me sit back and think about how I handle all my daily task and projects.  Especially with my obsession lately for absolute peak performance in my life. “When I’m in writing mode for a novel, I get up at four a.m. and
    Read More…

  • SkyDog Con CTF – The Legend Begins

    SkyDog Con CTF – The Legend Begins

    Sky Dog Con CTF – Over but not forgotten. Download Link http://bit.ly/SkyDogConCTF Instructions The CTF is a virtual machine and works best in Virtual Box. This OVA was created using Virtual Box 4.3.32. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you
    Read More…

  • Stopping FTP Brute Force Attacks in FreeBSD and OpenBSD

    Stopping FTP Brute Force Attacks in FreeBSD and OpenBSD

    This is a great little article that I came across talking about stopping FTP brute force attacks in OpenBSD or FreeBSD (both of my favorite OS’s). It assumes that your using PF as your firewall (which you should!). You can easily stop bruteforce attacks by limiting connections per IP using pf firewall under FreeBSD or
    Read More…

  • My Favorite New Toy – Nokia 770

    My Favorite New Toy – Nokia 770

    So I’ve had my Nokia 770 for awhile now and I love this thing. I recently upgraded the memory in mine to 2Gigs which really improved it’s performance. I generally use it to check my email and check on quotes for various stocks and such. It’s pretty sweet. http://amzn.to/2lbKDYa

  • Double Kill – Hacker’s Dome CTF Walk Through Part 1

    Double Kill – Hacker’s Dome CTF Walk Through Part 1

    This past weekend our Quantum Security CTF Team (consisting of Kamil @vavkamil and myself @jamesbower ) competed on the Hacker’s Dome – Double Kill CTF.  The competition consisted of two vulnerable machines with each containing both a user flag and a super user (root) flag.  We were able to capture both flags on the first
    Read More…

  • SkyDog Con 2016 CTF – Walk Through Guide

    SkyDog Con 2016 CTF – Walk Through Guide

    Download Link The VM is now available for download on Vulnhub at the link below. https://www.vulnhub.com/entry/skydog-2016-catch-me-if-you-can,166/ Instructions The CTF is a virtual machine and works best in Virtual Box. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you downloaded it. After importing
    Read More…

  • Kioptrix Level 1 Hacking Challenge Walkthrough

    Kioptrix Level 1 Hacking Challenge Walkthrough

    This is a walkthrough for Kioptrix Level 1. Although getting root on this box is pretty straightforward it’s a great place for those looking to get their feet wet when it comes to boot2root VM’s. I actually suggest this as a starting place rather than something like Metasploitable2, which is almost overwhelming with it’s list
    Read More…

  • Linux Memory Analysis: How to Start and What You Need to Know

    Linux Memory Analysis: How to Start and What You Need to Know

    Are you ready to dive into the exciting world of memory analysis?!? No? Well that’s too bad because you need to know it. There’s an old saying in InfoSec, “The packet doesn’t lie.” Well the same is true for memory analysis. It simply is what it is and because of that, can provide a wealth
    Read More…