Skip to content

James Bower – Security Eng and Data Science | Follower of Christ

Security Data Science and Deductions

  • Twitter

Author: jbower

  • Home
  • jbower
Memory Forensics

Linux Memory Analysis: How to Start and What You Need to Know

August 7, 2017March 5, 2021 jbower

Are you ready to dive into the exciting world of memory analysis?!? No? Well that’s too bad because you need to know it. There’s an

Read More
Threat Profile

Threat Profile: Killer Swag

June 13, 2017March 5, 2021 jbower

Introduction I’ve been monitoring an interesting threat for the past several days, a group I’m referring to as “Killer Swag”. Mainly because the initial dropper

Read More
Bro IDS Threat Hunting

Threat Hunting with Bro IDS

February 20, 2017March 5, 2021 jbower

This post is a quick look at how I personally use Bro IDS for threat hunting. Specifically some of the queries I run when I

Read More
CTF

SkyDog Con 2016 CTF – Walk Through Guide

October 23, 2016January 28, 2021 jbower

Download Link The VM is now available for download on Vulnhub at the link below. https://www.vulnhub.com/entry/skydog-2016-catch-me-if-you-can,166/ Instructions The CTF is a virtual machine and works

Read More
Bro IDS

How to Install Bro IDS 2.5 on Ubuntu 16.0x

September 5, 2016January 28, 2021 jbower

I decided to write out the steps I took to for installing Bro IDS 2.5 on Ubuntu 16.0x. Before we begin installing Bro from source

Read More
CTF

SkyDog Con CTF – The Legend Begins

November 2, 2015May 9, 2022 jbower

Sky Dog Con CTF – Over but not forgotten. Download Link https://download.vulnhub.com/skydog/SkyDogCTF.ova Instructions The CTF is a virtual machine and works best in Virtual Box.

Read More
Uncategorized

Quick and Dirty: Installing Htop on FreeBSD 10.x

August 31, 2015January 28, 2021 jbower

Htop is an interactive system-monitor process-viewer written for Linux. On most of my servers I have it up and running continually if I’m not actively

Read More
PCAP Traffic Visualize Wireshark

How to Visualize Network PCAP Files in Kali Linux

September 15, 2014January 28, 2021 jbower

So this past weekend I attended the Security Onion Conference in Augusta, GA.  While sitting in the back listening to some great speakers, @pentestfail and

Read More
Uncategorized

Defeating Tr0ll – Infosec Challenge Walkthrough

September 8, 2014January 28, 2021 jbower

This is my walkthrough for defeating Tr0ll infosec challenge.  This is another great “boot2root” VM  that kept my guessing quite a few times.  It also

Read More
Uncategorized

Kioptrix Level 1 Hacking Challenge Walkthrough

August 13, 2014January 28, 2021 jbower

This is a walkthrough for Kioptrix Level 1. Although getting root on this box is pretty straightforward it’s a great place for those looking to

Read More

Posts navigation

1 2 Next

Categories

  • Bro IDS
  • CTF
  • Memory Forensics
  • Metasploit
  • PCAP
  • PF
  • Powershell
  • Productivity
  • Threat Hunting
  • Threat Profile
  • Toys
  • Traffic
  • Uncategorized
  • Visualize
  • Wireshark
  • Workout

Recent Posts

  • Linux Memory Analysis: How to Start and What You Need to Know
  • Threat Profile: Killer Swag
  • Threat Hunting with Bro IDS
  • SkyDog Con 2016 CTF – Walk Through Guide
  • How to Install Bro IDS 2.5 on Ubuntu 16.0x

Tags

Boot2Root CTF CTF365 CVE-2012-1823 Diet Dirb featured featured featured Firewall FreeBSD Hackers Dome Hacking Hacking Challenge Htop Kioptrix LiME Metasploit Monitoring NetworkMiner Nikto Nmap Nokia 770 OpenBSD PCAP Peak Performance PF Productivity Quotes Security Threat Intelligence Toys Tr0ll Traffic Visualize Volatility Wireshark Workout

Archives

  • August 2017
  • June 2017
  • February 2017
  • October 2016
  • September 2016
  • November 2015
  • August 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • June 2013
  • August 2009
  • September 2008
All Rights Reserved 2021.
Proudly powered by WordPress | Theme: Fairy Blog by Candid Themes.