Gary HoffmaninPortUnreachableAutomated OSINT with ScumblrWe all know that open source intelligence gathering can be quite time consuming, but the information found is sometimes invaluable so it’s…May 7, 2018May 7, 2018
Gary HoffmaninPortUnreachableCTF walkthrough : VulnHub “RickdiculouslyEasy”This blog will be a run through of the beginner level CTF challenge, “RickdiculouslyEasy” image on VulnHub available at:Oct 19, 20173Oct 19, 20173
Gary HoffmaninPortUnreachableMy first CTF challenge — VulnHub NecromancerThis blog will be a run through of my first ever CTF challenge which was the Necromancer on VulnHub available at —…Oct 11, 2017Oct 11, 2017
Gary HoffmaninPortUnreachableSelf-Study SANS SEC503 GCIASo, I’ve recently passed the GIAC Intrusion Analyst (GCIA) exam after 7 months of hard self-study as I was unable to attend a SANS SEC503…Oct 11, 20171Oct 11, 20171
Gary HoffmaninPortUnreachableExploiting Cisco HSRPHSRP provides redundancy for IP networks ensuring that traffic can transparently recover from first hop failures. Devices which share a…Oct 11, 2017Oct 11, 2017
Gary HoffmaninPortUnreachableVLAN Hopping VulnerabilityVLAN hopping is a vulnerability that can be leveraged by an attacker to gain access to networked resources on another virtual LAN (VLAN)…Oct 11, 2017Oct 11, 2017
Gary HoffmaninPortUnreachableMalicious IP FragmentationIf you read my previous blog article on IP Fragmentation, you should be fully versed on what it is and how it works. Although fragmentation…Oct 11, 20171Oct 11, 20171
Gary HoffmaninPortUnreachableUnderstanding IP FragmentationFragmentation occurs when an IP datagram traverses a network which has a maximum transmission unit (MTU) that is smaller than the size of…Oct 11, 20171Oct 11, 20171