Rob FullerFour Phases of Offensive Security TeamsFor brevity, I will be using the term “partner” to refer to the customer, Defensive Team, IT Team, or other direct consumers of the…Jul 5, 2020Jul 5, 2020
Rob FullerRecently I had the privilege and honor to be asked for my input into the Tribe of Hackers — Red…Wiley — Tribe of Hackers: Red Team Edition ($25 at time of post)Aug 19, 2019Aug 19, 2019
Rob FullerYou shouldn’t block people on Twitter, learning to process differing opinions is hard but worth it.This morning I was going to make a tweet saying exactly that. It was an innocent intent to talk about how we should be open to other’s…Nov 16, 2017Nov 16, 2017
Rob Fuller#ASOP-DK-WiMAcronyms are Stupid if the Other Person Doesn’t Know What it Means.Nov 16, 2017Nov 16, 2017
Rob FullerA Thirsty NationSupply and demand of Information Security Professionals in the U.S.May 31, 2016May 31, 2016
Rob FullerFriendly FireThe unfortunate result of a competitive relationshipJan 26, 20164Jan 26, 20164
Rob FullerRisk Ghosts and Infosec Ghost BustingOne of the things rarely talked about in organizations are the fears that each individual in the executive branch of the org has in regards…Jan 21, 20161Jan 21, 20161
Rob FullerReverse Proxying Attacker ToolsEver want to have all of your C2 go to the same box, have the functionality of Meterpreter, and Empire, while making it so if anyone goes…Dec 31, 2015Dec 31, 2015
Rob FullerFull Disclosure — SingleClick ConnectUpdate: I originally posted this to the Full Disclosure mailing list but for some reason it wasn’t accepted via the moderator so I’m…Dec 28, 2014Dec 28, 2014