Do you really need to do that Human?

On a warm spring morning, the sun rose over the Johnson family’s backyard, revealing a perfectly manicured lawn, vibrant flowerbeds, and a gleaming new vegetable patch. The yard was the pride of the family, especially Mrs. Johnson, who had spent months cultivating it. But lurking in the coop by the fence was a group of Read More …

Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …

Conference Video – Win32 Exploit Development With Mona and the MSF Framework

In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …

Cleaning a Backyard Chicken Coop

It really doesn’t take much to clean a small coop like this when you want to keep a small number of backyard chickens.  You have to pay attention to a few specific things, but other than that it only takes an hour or so, once a month to keep things clean, and the smell away.

Studio Notes – Exploring Modulation

In this overview, Berklee Online instructor Loudon Stearns gives a broad overview of synthesis and the function of modulation within synthesis. When modulation is assigned in a synth or sampler the user must define the modulation source, destination, amount, and direction.

Conference Video – Offensive Countermeasures: Still trying to bring sexy back

Why is it that the Hackers and Penetration Testers get to have all of the “sexy” fun? In this presentation we will cover some cool tricks to confuse, block or mislead attackers. Penetration testers may be angered during this presentation as we will describe how to make their lives difficult. The term “hacking back” will Read More …

Some not so quick reads

Japan Birth Rate Thread Reader How both parties have failed The Masquerade & The Void Farewell Address The alternate domination of one faction over another, sharpened by the spirit of revenge, natural to party dissension, which in different ages and countries has perpetrated the most horrid enormities, is itself a frightful despotism. But this leads Read More …

Conference Video – Fantastic OSINT and where to find it

Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.