(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Tor

CTF-Pasteables

2022-06-13T17:38:43-04:00

“Typing Kills”, so even if you do not agree with this; it’s true. Operator error grows the more you type. It’s akin to “measure twice, cut once”. In Capture the Flags (CTF’s), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

CTF-Pasteables2022-06-13T17:38:43-04:00

Forcepoint 2015 Threat Report

2022-06-15T00:55:26-04:00

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Forcepoint 2015 Threat Report2022-06-15T00:55:26-04:00

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

2022-06-13T18:35:49-04:00

Hello from Puerto Rico. Here are our slides from Jose Fernandez’s talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the future. By the time we got to the beach, the Internet is hopefully in a slightly better state than we left [...]

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct2022-06-13T18:35:49-04:00
Go to Top