LeighAdventures with Pi — #1 Set Up Without a KeyboardThe first in what hopefully becomes a series in which I rediscover how much fun hacking things and making them work can be!May 2, 2018May 2, 2018
LeighinSecurityBytesVulnhub.com Bulldog CTF SolutionHere’s my write up of a solution to the Bulldog CTF VM by @frichette_n, and hosted on Vulnhub.com.Nov 1, 20172Nov 1, 20172
LeighinSecurityBytesQuick One: Stop Calling it ‘Identity Theft’This is just a quick post inspired by some comments that I’ve seen recently on Twitter following some mega-breaches.Sep 27, 20172Sep 27, 20172
LeighinSecurityBytesEquifax ShenanigansAs we enter the breach era, the sheer scale of the Equifax breach almost fails to register or most people; hundreds-of-millions of people…Sep 15, 20171Sep 15, 20171
LeighinSecurityBytesVulnhub.com — Moria 1.1 SolutionI originally posted my first effort here, but conceded that I hadn’t managed to get root since I’d been caught up with a hash problem.Jun 22, 2017Jun 22, 2017
LeighVulnhub.com — Moria 1.1 CTF *WIP* SolutionI’ve reached an impasse with this one, so I’m writing up my current progress and walking away for a while. I will try to come back to this…Jun 21, 2017Jun 21, 2017
LeighinSecurityBytesBricking IoT devices gives incentives for better security(was: ‘How to force manufacturers to take IoT security seriously?’)Apr 7, 20173Apr 7, 20173
LeighinSecurityBytesVulnhub.com — Tr0ll2 CTF WalkthroughI’m warming up, stretches and leans, so that I can pull the trigger and start my OSCP, so an invite to play another VM from Pete was…Mar 1, 20174Mar 1, 20174
LeighinSecurityBytesSecure DevOps Framework — SummaryDevOps is a new mindset for a business adopting it, and it’s one that is necessarily going to take some time to really get it working…Feb 16, 2017Feb 16, 2017
LeighinSecurityBytesDirectionless AgileI’ve seen some amazing things delivered via agile that could not possibly have been delivered in any other methodology. But it’s a…Feb 15, 20171Feb 15, 20171