clean up /boot (for Ubuntu at least)

Here is a quick set of commands to clean up the /boot partition on an Ubuntu linux system. First check what your kernel version is  so you won’t delete the running kernel image: uname -r Now run this for a list of installed kernels: dpkg –list ‘linux-image*’ | grep ^ii delete the kernels you don’t Read More …

What are the advantages of FASP

The speed increases are achieved by sending larger packets than TCP, not waiting for confirmation that a packet has been received before sending the next one, and only re-sending packets that are confirmed as having been dropped. FASP (Fast and Secure Protocol), used in IBM Aspera, offers significant advantages for cloud data transfer, enabling faster, Read More …

Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …

The Dangers of Project Russia

A wonderfully frightening read. My friends and family will attest, that many times I have stated that we are in open warfare with Russia in the internet/ technological realm of things.  The Russia Information Warfare Manual is a very good read. The books offered a detailed program of spiritual warfare against Western democracies culminating in Read More …

What are Cascading Style Sheets?

CSS, short for Cascading Style Sheets, is a stylesheet language used to control the appearance and layout of web pages. Introduced by the World Wide Web Consortium (W3C) in 1996, CSS separates the content of a website (structured with HTML) from its visual presentation, allowing developers to create aesthetically pleasing and user-friendly designs. Core Concepts Read More …

Conference Video – Win32 Exploit Development With Mona and the MSF Framework

In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …

Don’t track my kids

A blurb of a post this time, but something I want to make sure everyone is aware of. Remember, Remember If your kids are a member Then they became the product and the future is out of luck Don’t track my kids We need to make sure our kids get a chance to be kids, Read More …

BGP: The Backbone of Internet Routing and Its Security Challenges

In the vast and interconnected world of the Internet, one of the most critical protocols ensuring the flow of data is Border Gateway Protocol (BGP). BGP is the routing protocol that enables different autonomous systems to communicate and exchange routing information. Without BGP, the Internet as we know it would not be able to function, Read More …

Conference Video – Dirty Red Team tricks

Let’s time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East and Mid Atlantic Collegiate Cyber Defense competition events. Raphael Mudge, the developer of the Armitage Metasploit GUI, will guide you on this journey. You will learn how to automate Metasploit, nmap, and Read More …

Notes – Cost Effectiveness & Specialized Hardware

Specialized hardware can enhance cost-effectiveness in specific applications, offering optimized performance and reduced expenses when compared to general-purpose solutions, but the decision depends on the specific needs and application. Here’s a more detailed breakdown: Why Specialized Hardware Can Be Cost-Effective: Optimized Performance: Specialized hardware is designed for particular tasks, enabling them to perform those tasks Read More …