Fire and Forget: Meterpreter Automation

Throughout the past year I have been conducting routine phishing assessments for a client. For their final test of the […]


Physical Penetration Testing Basics – A Primer

Physical Penetration Testing is an assessment that involves testing physical security controls to see where they might fail. While this […]


A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

King Phisher Release 1.10

Today we’re proud to announce the next release of King Phisher, version 1.10. This release saw extensive changes under the […]


Prevent GPO from applying to your attack VM

You’re on an engagement and just obtained your first set of credentials. Score! You attempt to join your Windows VM […]

Interior Routing Protocols: The Basics

Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move […]

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]


Target Locked: Game Accounts

Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft […]

CTF Example – Coding

You sit there in front of your desk after getting hired in to a security position, and quickly realize that […]

CTF Example – Wireless Security

Each of SecureState’s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down […]