Jeremy TrinkainThe StartupKerberoasting in a NutshellPost-exploitation tools are the bread-and-butter for any successful cyber-attacker. Once the initial foothold is made into a network and…Oct 17, 20191Oct 17, 20191
Jeremy TrinkaAnatomy of a Cyber-AttackIt is often said that you must ‘know your enemy’ in order to succeed, but for many it may be a difficult mindset to step into. Fortunately…Aug 17, 2019Aug 17, 2019
Jeremy TrinkaPrediction of (Cyber)warfare — Security Teams Under Attack!It happens more often than I would like to admit, but I do catch myself daydreaming. Typically it is of a semi-cyberpunk landscape, not too…Jul 2, 2018Jul 2, 2018
Jeremy Trinka7 Resources to Get You Started in Operational CybersecurityOn just about every forum I have ever visited with a focus on cybersecurity, the question of “how do I even get into cybersecurity?”, or…May 17, 20183May 17, 20183
Jeremy TrinkaThree Ways to Keep Up with Cybersecurity NewsIt’s Monday morning. The beginning of a bright new work week. You’re well rested, and had a fantastic couple of days off to catch up on the…Apr 30, 2018Apr 30, 2018
Jeremy TrinkaThe USB Threat is [Still] Real — Pentest Tools for Sysadmins, ContinuedThis is a continuation of my post “Five Pentest Tools and Techniques (That Every Sysadmin Should Know)”. If you haven’t gotten the chance…Apr 19, 2018Apr 19, 2018
Jeremy TrinkaFive Pentesting Tools and Techniques (That Every Sysadmin Should Know)Step into the mind of a pentester.Apr 15, 20185Apr 15, 20185
Jeremy TrinkaEvent Log Auditing, DemystifiedIn my personal experience, the topic of reviewing event logs has received a fair amount grunts, groans, and questions such as “You honestly…Apr 8, 20182Apr 8, 20182