Skip to content

James Bower – Security Machine Learning / Alternative Data / Data Mining

  • Twitter

Author: jbower

  • Home
  • jbower
  • Page 2
CTF Metasploit

Double Kill – Hacker’s Dome CTF Walk Through Part 1

July 28, 2014January 28, 2021 jbower

This past weekend our Quantum Security CTF Team (consisting of Kamil @vavkamil and myself @jamesbower ) competed on the Hacker’s Dome – Double Kill CTF. 

Read More
Productivity

Creative Structure is Key by Haruki Murakami

January 14, 2014January 28, 2021 jbower

There is a quote I read today by Haruki Murakami that really made me sit back and think about how I handle all my daily

Read More
Powershell

Own Windows with PowerShell using Nishang

June 11, 2013January 28, 2021 jbower

Nishang is a framework and collection of scripts and payloads which enables usage of Windows PowerShell for offensive security and post exploitation during Penetraion Tests. 

Read More
Uncategorized

FreeBSD pkg_add little trick

August 19, 2009January 28, 2021 jbower

So don’t ask me why but I decided to run FreeBSD 6.0 on an older Dell Latitude laptop. Install goes fine. But now I’ve got

Read More
PF

Stopping FTP Brute Force Attacks in FreeBSD and OpenBSD

August 13, 2009January 28, 2021 jbower

This is a great little article that I came across talking about stopping FTP brute force attacks in OpenBSD or FreeBSD (both of my favorite

Read More
Productivity Workout

WORKOUT

September 24, 2008January 28, 2021 jbower

So I’ve been getting up @ 5am to workout and I must say that I’m pretty psyched about it. Well not the getting up at

Read More
Toys

My Favorite New Toy – Nokia 770

September 2, 2008January 28, 2021 jbower

So I’ve had my Nokia 770 for awhile now and I love this thing. I recently upgraded the memory in mine to 2Gigs which really

Read More

Posts navigation

Previous 1 2

Categories

  • Bro IDS
  • CTF
  • Memory Forensics
  • Metasploit
  • PCAP
  • PF
  • Powershell
  • Productivity
  • Threat Hunting
  • Threat Profile
  • Toys
  • Traffic
  • Uncategorized
  • Visualize
  • Wireshark
  • Workout
  • Twitter
  • GitHub
  • YouTube
  • LinkedIn

Videos

https://www.youtube.com/watch?v=FEb8KZoEyzI&t=1291s

Recent Posts

  • Linux Memory Analysis: How to Start and What You Need to Know
  • Threat Profile: Killer Swag
  • Threat Hunting with Bro IDS
  • SkyDog Con 2016 CTF – Walk Through Guide
  • How to Install Bro IDS 2.5 on Ubuntu 16.0x

Tags

Boot2Root CTF CTF365 CVE-2012-1823 Diet Dirb featured featured featured Firewall FreeBSD Hackers Dome Hacking Hacking Challenge Htop Kioptrix LiME Metasploit Monitoring NetworkMiner Nikto Nmap Nokia 770 OpenBSD PCAP Peak Performance PF Productivity Quotes Security Threat Intelligence Toys Tr0ll Traffic Visualize Volatility Wireshark Workout

Archives

  • August 2017
  • June 2017
  • February 2017
  • October 2016
  • September 2016
  • November 2015
  • August 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • June 2013
  • August 2009
  • September 2008
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Fairy Blog by Candid Themes.