CompSec Direct

About CompSec Direct

CompSec Direct is a C4ISR firm specialized in CyberSecurity. SDVOSB, QMCS & MBE certified firm of former DOD network operators.

CompSec Direct wins firmware analysis prototype event held at Dreamport

By |2021-04-08T14:08:42-04:00June 8th, 2020|Categories: Automation, Cyber, Reports|Tags: , , , |

After placing 5th on a previous challenge, we were happy to place 1st on a subsequent firmware challenge. We improved our process, provided analysis and emulation findings to set us apart from the rest. Please visit https://dreamport.tech/events/event-rpe-the-broken-gear-in-the-watch-02.php for more information on the technical aspects of this challenge.

Comments Off on CompSec Direct wins firmware analysis prototype event held at Dreamport

Non-attribution classification model published

By |2021-04-08T14:59:32-04:00March 8th, 2020|Categories: Attribution, Cyber|Tags: , , , , |

The proposed model was published on the Military Cyber Professional Association (MCPA) 2020-2021 magazine. Although the author used humor in this publication; no standardized model currently exists to technically vet and verify how non-attribution is achieved. Instead, we opted to classify links starting from a point of origin and how this is perceived on receiving end [...]

Comments Off on Non-attribution classification model published

BSides PR 2019 Wrap-Up: It starts with you

By |2019-10-16T22:27:25-04:00October 16th, 2019|Categories: Case Study, Cyber, Defensive Methodology, Disclosure, Forensic, Incident Response, Laws, Legislation, Videos|Tags: , , , , , , , |

Our President, @jfersec, had the privilege of Keynote during BSides PR 2019. During our presentation, we discussed some hard truth's around: the way DeepFakes and "WeakFakes" are utilizedhow we are good imitators and bad innovators in Puerto Ricopast efforts associated with Accelerated Disclosures for public and private companies in Puerto Ricoflaws associated with contract negotiations with [...]

Comments Off on BSides PR 2019 Wrap-Up: It starts with you

CTF-Pasteables

By |2019-10-16T12:38:29-04:00October 16th, 2019|Categories: Cyber, Hacking, Pen-testing, Powershell, Scripts, Tor|

"Typing Kills", so even if you do not agree with this; it's true. Operator error grows the more you type. It's akin to "measure twice, cut once". In Capture the Flags (CTF's), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

Comments Off on CTF-Pasteables

Open-Data wants to be free, but no one looks.

By |2019-09-29T15:03:16-04:00September 29th, 2019|Categories: e-Discovery, Hunting, Scripts|Tags: , , , , , , |

Problem: A few months ago, Giancarlo Gonzales, a former CIO for the island of Puerto Rico, indicated the lack of updates towards open-data in data.pr.gov. As part of an open-data initiative, Puerto Rico created its own version of data.gov, called data.pr.gov, which provides free and open access to government information datasets. Giancarlo alluded to the lack [...]

Comments Off on Open-Data wants to be free, but no one looks.

Case 1

By |2019-10-16T12:11:09-04:00August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: |

Case 1. If you like the case study, hit us up and let us know. Take care. Malware Analysis on Hybrid-Analysis. case1Download

Comments Off on Case 1

CompSec Direct now approved Cyber-security vendor in Maryland

By |2019-08-15T13:22:04-04:00August 15th, 2019|Categories: Contracts, Cyber, Defensive Methodology, Forensic, Hunting, News, Pen-testing, Social Engineering|Tags: , , , , , |

CompSec Direct has been approved as a Qualified Maryland Cybersecurity Seller (QMCS) by the Department of Commerce of Maryland. This allows us to provide cybersecurity services to qualifying companies under the Buy Maryland Cybersecurity (BMC) program. The program allows companies with 50 employees or less to purchase services and products from approved vendors like CompSec Direct. [...]

Comments Off on CompSec Direct now approved Cyber-security vendor in Maryland

White pages are back!: Aeronet Wireless exposes customer info over SNMP

By |2019-08-15T13:19:39-04:00October 12th, 2018|Categories: Disclosure, e-Discovery|Tags: , , |

Problem CompSec Direct recently became aware of an information disclosure problem affecting Aeronet Wireless customers in Puerto Rico. In short, querying Shodan.io for Aeronet Wireless and SNMP presents publicly accessible information, such as customer names, IP's, possible account ID's and geographic locations. Records Disclosed Code Proof https://www.shodan.io/search?query=org%3A%22Aeronet+Wireless%22+port%3A%22161%22 162.246.174.134    161    Linux XXX XXX 2.6.32.27 #2 [...]

Comments Off on White pages are back!: Aeronet Wireless exposes customer info over SNMP

Data Mining PDF documents; using data conversion to reduce analysis time

By |2019-08-15T13:19:40-04:00May 31st, 2017|Categories: Automation, e-Discovery, Forensic, Scripts, Tesseract|Tags: , , , , , |

Problem A month ago, we became aware of a way to harvest legal notifications from a government web-site. Link Here The web-server allows simple requests to be crafted in order to download PDF documents related to court proceedings. After a few hours, we had over 25,000 PDF documents available to analyze. Now the question becomes: What [...]

Comments Off on Data Mining PDF documents; using data conversion to reduce analysis time

Apache brute: A simple brute force deterrent for Linux

By |2019-08-15T13:19:40-04:00May 31st, 2017|Categories: Defensive Methodology|Tags: , , , |

We published a simple script to help identify and block possible brute-force attempts on a Linux web-server. The script counts the amount of "bad-actions" an ip has logged in the Apache logs and blocks the ip on port 443. This script also displays top 20 visitor information using geoiplookup (which should be installed) and performs a [...]

Comments Off on Apache brute: A simple brute force deterrent for Linux
Go to Top