(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Defensive Methodology

Why going after wp-config is a quick way to get banned

2022-06-15T00:59:14-04:00

The first is actually more common place. The second assumes the admin that maintains WordPress leaves a backup or older version of the file readable by any visitor that happens to “guess” a filename. In the past, CompSec Direct has been successful employing both techniques for customers during security audits, however the second leaves a 404 [...]

Why going after wp-config is a quick way to get banned2022-06-15T00:59:14-04:00

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

2022-06-13T18:35:49-04:00

Hello from Puerto Rico. Here are our slides from Jose Fernandez’s talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the future. By the time we got to the beach, the Internet is hopefully in a slightly better state than we left [...]

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct2022-06-13T18:35:49-04:00

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

2022-06-13T18:36:39-04:00

Hello Everyone, Here are the slides from our presentation at Bsides Charm 2015. We look forward to coming back next year for another excellent community driven event.Mass Hunting with Powershell

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct2022-06-13T18:36:39-04:00
Go to Top