Ethan TroyFedRAMP: A Comprehensive Overview of the Federal Risk and Authorization Management ProgramAs more and more government agencies move their IT services to the cloud, the need to ensure the security and integrity of these digital…May 1, 2023May 1, 2023
Ethan TroyinOffensive WalkingHack the Box — NibblesIn this walkthrough, we will be exploring the "Nibbles" machine from Hack the Box, without using Metasploit.Mar 22, 2023Mar 22, 2023
Ethan TroyA Dive into Understanding RMF for FISMA Compliance and Federal IT SystemsI attempt to explain the widely accepted and used Risk Management Framework for those interested in GRC careers.Mar 20, 2023Mar 20, 2023
Ethan TroyDemystifying FISMA Compliance and Risk Management Frameworks for Your SystemsUnderstanding FISMA compliance and risk management frameworks can be daunting, particularly when it comes to navigating the complex…Mar 19, 2023Mar 19, 2023
Ethan TroySimple Way to Compare Lists of IP Addresses in Python”The “lazy” in me tried to make this vulnerability analysis the other day easier on my poor spreadsheet-weary eyes.Mar 14, 2023Mar 14, 2023
Ethan TroyinOffensive WalkingHack the Box — LameJust another TJ Null box preparing for the OSCP on a Sunday.Mar 12, 2023Mar 12, 2023
Ethan TroyinOffensive WalkingHack the Box — DevelOne of the first HTB boxes I solved a few months ago from the TJ Null List in preparation for the PNPT and OSCP.Mar 6, 2023Mar 6, 2023