Why is it that the Hackers and Penetration Testers get to have all of the “sexy” fun? In this presentation we will cover some cool tricks to confuse, block or mislead attackers. Penetration testers may be angered during this presentation as we will describe how to make their lives difficult. The term “hacking back” will Read More …
What is a Dig Skirt?
A “dig skirt” in the context of poultry keeping, also known as a predator guard or anti-dig barrier, is a barrier made of metal, like hardware cloth or welded wire, that’s placed around the outside perimeter of a chicken coop or run, buried or secured to the ground, to prevent predators from digging under and Read More …
Some not so quick reads
Japan Birth Rate Thread Reader How both parties have failed The Masquerade & The Void Farewell Address The alternate domination of one faction over another, sharpened by the spirit of revenge, natural to party dissension, which in different ages and countries has perpetrated the most horrid enormities, is itself a frightful despotism. But this leads Read More …
Decoupling CI/CD from deployment
Decoupling CI/CD from deployment allows teams to build, test, and deploy code changes independently, offering more flexibility and control over releases, enabling faster feedback loops and risk reduction. Why Decouple? Improved Control and Stability: By separating deployment (moving the code to production) from release (making the code available to users), teams can deploy new versions of Read More …
What is Network Address Translation
Network Address Translation (NAT) is a method used in networking to modify the IP address information in the headers of data packets as they traverse a router. NAT allows multiple devices on a local network to share a single public IP address, facilitating efficient use of IP address space and adding a layer of security Read More …
Conference Video – Dirty Secrets They Didn’t Teach You In Class
This talk is about methodologies and tools that we use or have coded that make our lives and pentest schedule a little easier, and why we do things the way we do. Of course, there will be a healthy dose of Metasploit in the mix.
What is a VPN?
A Virtual Private Network, commonly referred to as a VPN, is a technology that creates a secure and encrypted connection between your device and the internet. It acts as a private tunnel for your online activities, shielding them from prying eyes and potential cyber threats. Originally developed to enable secure communication within corporate networks, VPNs Read More …
Conference Video – Fantastic OSINT and where to find it
Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.
Elmo adds to his conflict of interest
Just wanting to add to the growing list of issues with DOGE, and Elmo’s ability to decide what is a good or bad government program. Musk’s Starlink gets FAA contract At this point, he is just being blatant about it, knowing that there is hardly anything anyone can do, because the petty orange man-baby is Read More …
So many Leopards
So many of these posts on Social Media these days. ofc, this is the echo chamber that I am served by these platforms. So it this what I want to see, or what it thinks I want to see? I can honestly say, that it is getting exhausting muting, blocking, and unfollowing all of the Read More …