Homepage
Open in app
Sign in
Get started
Security Bytes
A byte or two of security
Follow
Certificate Based Authentication
2nd Factor or Not?
Pete
Feb 20, 2018
Security Vendors and Social Responsibility
Security Vendors and Social Responsibility
Or why their products should be priced more affordably
Pete
Dec 18, 2017
Vulnhub: Depth VM Walkthrough
Vulnhub: Depth VM Walkthrough
Time to go deep(ish)!
Pete
Dec 12, 2017
Vulnhub.com Bulldog CTF Solution
Vulnhub.com Bulldog CTF Solution
Here’s my write up of a solution to the Bulldog CTF VM by @frichette_n, and hosted on Vulnhub.com.
Leigh
Nov 1, 2017
Quick One: Stop Calling it ‘Identity Theft’
This is just a quick post inspired by some comments that I’ve seen recently on Twitter following some mega-breaches.
Leigh
Sep 27, 2017
Equifax Shenanigans
As we enter the breach era, the sheer scale of the Equifax breach almost fails to register or most people; hundreds-of-millions of people…
Leigh
Sep 15, 2017
Vulnhub: Ew Skuzzy VM walkthrough
Vulnhub: Ew Skuzzy VM walkthrough
I’ve been slowly working my way through this VM in my spare time over the last few of weeks, and I will say that I’ve had a lot of fun with…
Pete
Sep 7, 2017
Billu: b0x VM
Billu: b0x VM
A Vulnerable VM walkthrough:
Pete
Aug 9, 2017
MalwareTechs Arrest— A view on the Security Community and its reaction.
MalwareTechs Arrest— A view on the Security Community and its reaction.
Jerk or knee jerk?
Pete
Aug 7, 2017
ICO: Investigating cannot occur!
ICO: Investigating cannot occur!
Does the Information Commissioners Office actual investigate things?
Pete
Jun 30, 2017
Vulnhub.com — Moria 1.1 Solution
I originally posted my first effort here, but conceded that I hadn’t managed to get root since I’d been caught up with a hash problem.
Leigh
Jun 22, 2017
Docking DVWA
Docking DVWA
Simplifying install of Damn Vulnerable Web App
Pete
Apr 19, 2017
Bricking IoT devices gives incentives for better security
Bricking IoT devices gives incentives for better security
(was: ‘How to force manufacturers to take IoT security seriously?’)
Leigh
Apr 7, 2017
Sudon’t escape so easily!
Sudon’t escape so easily!
How poor sudo configuration leads to simple full root access.
Pete
Mar 23, 2017
Vulnhub.com — Quaoar VM Walkthrough
Vulnhub.com — Quaoar VM Walkthrough
Another vulnerable machine walk through!
Pete
Mar 19, 2017
Vulnhub.com — Pluck VM Walkthrough
Vulnhub.com — Pluck VM Walkthrough
What the Pluck!?
Pete
Mar 17, 2017
Blue Team fundamentals Part Two: Windows Processes.
Blue Team fundamentals Part Two: Windows Processes.
In part one I touched on logging and the importance of working with what you have already got, rather than trying to reinvent the wheel…
Pete
Mar 14, 2017
wfuzz— Using the web brute forcer
wfuzz— Using the web brute forcer
I like wfuzz, I find it pretty intuitive to use and decided to write a little bit about a couple of use cases for this neat little tool.
Pete
Mar 11, 2017
Vulnhub.com — Tr0ll2 CTF Walkthrough
Vulnhub.com — Tr0ll2 CTF Walkthrough
I’m warming up, stretches and leans, so that I can pull the trigger and start my OSCP, so an invite to play another VM from Pete was…
Leigh
Feb 28, 2017
Tr0ll2 VM
Tr0ll2 VM
Not done one of these in while, time to get back on the horse.
Pete
Feb 28, 2017
Secure DevOps Framework — Summary
Secure DevOps Framework — Summary
DevOps is a new mindset for a business adopting it, and it’s one that is necessarily going to take some time to really get it working…
Leigh
Feb 16, 2017
Blue Team Fundamentals.
It isn’t easy being blue…
Pete
Feb 15, 2017
Directionless Agile
I’ve seen some amazing things delivered via agile that could not possibly have been delivered in any other methodology. But it’s a…
Leigh
Feb 15, 2017
Secure DevOps #4 — Embedded Expertise
Secure DevOps #4 — Embedded Expertise
This is the final in a series of posts that will outline a framework I’ve developed and successfully deployed for applying effective…
Leigh
Feb 13, 2017
Secure DevOps #3 — Secure SDLC
Secure DevOps #3 — Secure SDLC
This is the fourth in a series of posts that will outline a framework I’ve developed and successfully deployed for applying effective…
Leigh
Feb 9, 2017
About SecurityBytes
Latest Stories
Archive
About Medium
Terms
Privacy
Teams