Down Under CTF memory Forensics Solve

I was working on the Memory Forensics Challenge for the Down Under 2021 CTF today and had a lot of fun so I wanted...

Setting up a Malware Analysis Lab

A few days ago, I published an updated look at my home network and made a post on Reddit about it. One of the...

2021 Update to my Home Network

About a year ago I decided to take a moment to look back at how my network engineering has progressed throughout the years. That...

Should you run malware in Windows Sandbox?

In Windows 10 update 1903 Microsoft introduced a new security feature for Windows Pro and Enterprise users. That feature is Windows Sandbox. Windows Sandbox...

The Issues with Security by Abstinence

Today I want to talk about a prevailing concept in security that I’m hereby referring to as security by abstinence. I know this is...

Further Securing Pi-Hole Access from Internet

Forward Over the course of the last year (year and a half) I’ve been working on methods to securely access my Pi-Hole admin interface...

Securing Pi-Hole Admin interfaces on the Internet

Introduction A while ago I wrote an article on how to access your Pi-hole interface from the internet securely. At the time of this...

Accessing Pi-Hole admin interface from the internet securely

Intro Everyone so often on the r/pihole subreddit you’ll see someone posting about how they discovered an admin interface in the wild, or there...

Solving the DEFCON 2019 Volatility Memory Forensics CTF

A few months ago I found the DEFCON2019 Volatility Memory Forensics challenge and decided to take a look. Memory Forensics are a personal favorite...

Cybersecurity Project: How I broke into the field

A quick forward with some background on this before I begin; a few days ago, one of the mods of the r/cybersecurity subreddit (which I highly...
WordPress Appliance - Powered by TurnKey Linux