Personal Security Quick Wins

Improving your security posture can be a daunting task, especially if you're not particularly tech savvy, so here are some quick wins to get you started, that I figure you can probably do within about 10 minutes. Automatic Updates Whether it's your phone, a Windows computer, a Macbook or your Smart TV, one of the …

HTB Writeups: Teacher

Teacher is my 30th machine on HackTheBox. User access is gained through finding partial credentials, fuzzing the password and then exploiting a hole in the Moodle software to leverage code execution and get a reverse shell. This initial access is then escalated from www-data to a userful user account using SQL database credentials found in …

HTB Writeups: Access

Access is the 29th machine I attempted on HackTheBox. User Access is gained through reading a MS Access database to get the password to a zipped file. Root access is gained by exploiting stored credentials. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub …

HTB Writeups: Active

Active, the 28th machine I attempted on HackTheBox, is a relatively easy box but with some bits that you can learn if you don't know much about exploiting Active Directory and Kerberos. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub and shared in …

OSCP: Complete

A more in depth report will come later, as I found myself too wrapped up in actually doing the OSCP material and labs to write up as I was going along, but after two attempts and a total of about 60 hours without sleep, I passed the OSCP exam and am officially an Offensive Security …

The Good, The Bad and The Public Key: The Implications of Encryption for IT Professionals and Society

Forms of encryption were invented long before the advent of the computer. Julius Caesar (100 BC – 44 BC) is said to have user a cipher to communicate with his armies and, while the complexity of encryption has increased exponentially, its purpose remains the same as it did over 2,000 years ago; to prevent unauthorised …

Design a site like this with WordPress.com
Get started