Attack ZeroLabREynth 2017 Binary Challenge 1 — MyFirstMalware.exeHey everyone! I took some time to look at this year’s LabREynth CTF. It is hosted by Palo Alto Networks, and this is my first year doing…Jul 24, 2017Jul 24, 2017
Attack ZeroOn the Subject of Database EncryptionHey everyone — In my last post, I mentioned that there are different ways to encrypt data that you want to store in the database. I wanted…Jun 23, 2017Jun 23, 2017
Attack ZeroOn the Subject of Database Encryption, Part 2Hey everyone — We had some fun last week working on encryption in MariaDB. This week, we will do something similar for another popular…Jun 23, 2017Jun 23, 2017
Attack ZeroSetting Up A Small Windows DomainHey everyone — I wanted to take some time to set up an environment for us to play in. Instead of assuming that everyone reading this was…Jun 23, 2017Jun 23, 2017
Attack ZeroUsing AppLockerHey everyone — Today, we are going to talk about AppLocker.Jun 23, 2017Jun 23, 2017
Attack ZeroUnderstanding and Deploying EMETWe have talked about a few defense measures you can employ on your computer or in your organization. One of those tools was EMET…Jun 23, 2017Jun 23, 2017
Attack ZeroDomain Fronting and YouHey everyone — I was reading some articles, and I came across a paper on something called Domain Fronting. I wanted to talk a little bit…Jun 23, 2017Jun 23, 2017
Attack ZeroMaking a Supermicro 826B Chassis Out of an 826 ChassisThis post is a little bit niche, but I hope it helps someone out there. First, a little background. If you do not care about this, then…Jun 9, 2017Jun 9, 2017