What is the average net worth by state? This is always a fun page to check in once and awhile on, to see what the congress critters are up to. Currently it is based on 2018-2019 numbers, but even then I though Nancy Pelosi would be much higher up the list. Also surprised that Rick Read More …
Tag: 1bb
How to change user agent in nmap
NMAP How to change user agent You can find the default value in /usr/share/nmap/nselib/http.lua (At the beginning of the file, a couple of lines after the comments) local USER_AGENT = stdnse.get_script_args(‘http.useragent’) or “Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)” You can change the value with this line local USER_AGENT = stdnse.get_script_args(‘http.useragent’) or “Mozilla/5.0 (compatible; MSIE 9.0; Read More …
New Lyrics :: Golden Brown
The music for the most part is done, and just really doing final tweeks to those. Started to record vocals today, as I am good with where the lyrics are at right now. The verses are from my time working restaurant jobs. They tell of my experience, emotions, and the things I specifically remember from Read More …
Backyard Chickens – Video List
Backyard Chickens – Day 112 Video List Baby Chickens Chilling – Irakere Babalú Ayé Dual Baby Chickens Baby Chickens La Oreja de Van Gogh Taylor and Gaga walk by camera Bea feeds Chicks, Nuria frees them LCD Soundsystem
AuKill EDR Post
Summary AuKill is a malicious software, often used by ransomware groups, designed to disable endpoint detection and response (EDR) security solutions on a system, essentially allowing attackers to bypass security measures before deploying ransomware by terminating EDR processes using a vulnerable, outdated driver like the Process Explorer driver from Sysinternals; effectively “killing” the EDR functionality. Key points about Read More …
Hook Chain EDR Kill
Summary Every binary loaded into WIndows, has a list of needed functions and processes in order for it to function properly. THink of a browser, it will use a Windows DLL to resolved the hostname to the IPv4 address and so forth. This Table can be hijacked, so instead of pointing to the appropriate function Read More …
New video for a song
Not 100% sure why I made a new video for this particular song, but I know once I got started I might as well finish it. Anyway here it is….
Notes on “Paved Road”
Lessons from Securing Internal Applications WebappSec Link Building a Security Platform Engineering Team “”” I’m a big fan of building security into existing processes, a term coined as “secure paved roads” by Jason Chan, Ex-Netflix CISO. The idea behind this is that security should mostly be invisible. The average employee should simply not have to Read More …
2 AD or not 2 AD
To AD or not to AD, that is the question. Whether ’tis nobler to continue patching The slings and of the security researchers, Or to take arms against a sea of criminal adversaries And by opposing end them. To die to AD? No more? and by a decommission to say we end AD? The heartache Read More …
Studio Notes – Limiters
With acoustic guitars you will hear some strums that are really loud and some strums that aren’t quite as loud. It could be very well played but you will still have some variation between strums. Sometimes the dynamic is quite loud and a compressor sometimes just can’t get a hold of that because the difference Read More …