ASM – Attack Surface Management

Attack Surface Management (ASM) focuses on identifying, monitoring, and mitigating potential vulnerabilities and risks across an organization’s entire digital footprint, including both known and unknown assets, to reduce the potential attack surface. Here’s a more detailed explanation:  Continuous Process:  ASM is not a one-time task, but rather a continuous process of discovery, analysis, prioritization, remediation, Read More …

Backyard Chickens – Clean the Coop Again

Generally you need to do a full cleaning of your backyard coop/ run/ etc. around once every 3 months. By this, I mean the area around the chickens. The nesting boxes you have to keep much cleaner. Those I try and do about once a month. This is where you chicken is going to lay Read More …

Peter Thiel’s move to the right

Peter Thiel and his potential desire to collapse all things America have been in the US news quite a bit lately. This isn’t the first time I was aware of this overly private person, and I do mean before Hulkamania. I’m not entirely sure when Peter Thiel and his Yarvin-acolytes began to join this movement Read More …

Do you really need to do that Human?

On a warm spring morning, the sun rose over the Johnson family’s backyard, revealing a perfectly manicured lawn, vibrant flowerbeds, and a gleaming new vegetable patch. The yard was the pride of the family, especially Mrs. Johnson, who had spent months cultivating it. But lurking in the coop by the fence was a group of Read More …

clean up /boot (for Ubuntu at least)

Here is a quick set of commands to clean up the /boot partition on an Ubuntu linux system. First check what your kernel version is  so you won’t delete the running kernel image: uname -r Now run this for a list of installed kernels: dpkg –list ‘linux-image*’ | grep ^ii delete the kernels you don’t Read More …

What are the advantages of FASP

The speed increases are achieved by sending larger packets than TCP, not waiting for confirmation that a packet has been received before sending the next one, and only re-sending packets that are confirmed as having been dropped. FASP (Fast and Secure Protocol), used in IBM Aspera, offers significant advantages for cloud data transfer, enabling faster, Read More …

Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …