(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Demo

Breach Village Capture the Flag and Hack the Case

2025-04-29T20:56:29-04:00

CompSec Direct ran Breach Village during a local BSides conference. "We wanted Breach Village to showcase real-problems and not the made up scenarios people see in Capture the Flags events. Realism and modern problems in cyber security are difficult to showcase into a fun learning environment" said Jose Fernandez. Breach Village used our Kleared4 cyber range [...]

Breach Village Capture the Flag and Hack the Case2025-04-29T20:56:29-04:00

My CPAP has a recall; let’s open it instead!

2023-08-13T12:50:04-04:00

"If you or a loved one has ever used a CPAP device..." Our President, Jose Fernandez, gave a medical device presentation at BioHacking Village during DefCon 31. This presentation focused on bringing awareness to privacy related issues related CPAP devices, how to passively identify some CPAP devices and follow on work for exploit related research for [...]

My CPAP has a recall; let’s open it instead!2023-08-13T12:50:04-04:00

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

2022-06-15T00:45:03-04:00

Our President, Jose Fernandez, presented ZigBee research at Bsides Charm 2017 in Baltimore on April 29, 2017. The presentation, called Frony Fronius: Exploring ZigBee signals from SolarCity covered IoT (Internet of Threats) findings on commercial solar panel solutions. Part of the presentation asked participants how they felt about e-meters and how companies are beginning to deploy [...]

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor2022-06-15T00:45:03-04:00

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

2022-06-15T00:53:53-04:00

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files in conjunction with the Shodan api in python to search for associations between different different fields. Using this tool reduces initial [...]

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico2022-06-15T00:53:53-04:00

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

2022-06-13T18:23:30-04:00

We hosted a training session on remote incident response operation on Oct 7, 2016. The course was provided “pro-bono” through @Obsidis_NGO‏, participants paid a small registration fee that covered lunch. Students were able to analyze malware on remote systems in a safe and controlled environment using our RIL platform. We want to thank everyone who attended the session and [...]

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts2022-06-13T18:23:30-04:00

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

2022-06-13T18:35:49-04:00

Hello from Puerto Rico. Here are our slides from Jose Fernandez’s talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the future. By the time we got to the beach, the Internet is hopefully in a slightly better state than we left [...]

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct2022-06-13T18:35:49-04:00

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

2022-06-13T18:36:39-04:00

Hello Everyone, Here are the slides from our presentation at Bsides Charm 2015. We look forward to coming back next year for another excellent community driven event.Mass Hunting with Powershell

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct2022-06-13T18:36:39-04:00

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

2022-06-13T18:39:44-04:00

Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to forge a Kerberos ticket and receive domain admin privileges via the forged ticket. I want to thank Sylvain Monné aka Bidord [...]

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero2022-06-13T18:39:44-04:00
Go to Top