LeighAdventures with Pi — #1 Set Up Without a KeyboardThe first in what hopefully becomes a series in which I rediscover how much fun hacking things and making them work can be!2 min read·May 2, 2018----
LeighinSecurityBytesVulnhub.com Bulldog CTF SolutionHere’s my write up of a solution to the Bulldog CTF VM by @frichette_n, and hosted on Vulnhub.com.4 min read·Nov 1, 2017--2--2
LeighinSecurityBytesQuick One: Stop Calling it ‘Identity Theft’This is just a quick post inspired by some comments that I’ve seen recently on Twitter following some mega-breaches.2 min read·Sep 27, 2017--2--2
LeighinSecurityBytesEquifax ShenanigansAs we enter the breach era, the sheer scale of the Equifax breach almost fails to register or most people; hundreds-of-millions of people…3 min read·Sep 15, 2017--1--1
LeighinSecurityBytesVulnhub.com — Moria 1.1 SolutionI originally posted my first effort here, but conceded that I hadn’t managed to get root since I’d been caught up with a hash problem.4 min read·Jun 22, 2017----
LeighVulnhub.com — Moria 1.1 CTF *WIP* SolutionI’ve reached an impasse with this one, so I’m writing up my current progress and walking away for a while. I will try to come back to this…6 min read·Jun 21, 2017----
LeighinSecurityBytesBricking IoT devices gives incentives for better security(was: ‘How to force manufacturers to take IoT security seriously?’)2 min read·Apr 7, 2017--3--3
LeighinSecurityBytesVulnhub.com — Tr0ll2 CTF WalkthroughI’m warming up, stretches and leans, so that I can pull the trigger and start my OSCP, so an invite to play another VM from Pete was…12 min read·Mar 1, 2017--4--4
LeighinSecurityBytesSecure DevOps Framework — SummaryDevOps is a new mindset for a business adopting it, and it’s one that is necessarily going to take some time to really get it working…3 min read·Feb 16, 2017----
LeighinSecurityBytesDirectionless AgileI’ve seen some amazing things delivered via agile that could not possibly have been delivered in any other methodology. But it’s a…3 min read·Feb 15, 2017--1--1