logical

Pentesting Restrictive Environments – Part 2

Putting it all together Note: This blog is part 1/2 of Pentesting Restrictive Environments. I highly recommend reading part 1 […]

physical

Physical Penetration Testing Basics – A Primer

Physical Penetration Testing is an assessment that involves testing physical security controls to see where they might fail. While this […]

research

A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

development

King Phisher Release 1.9

Today SecureState is proud to announce the latest release of our open source Phishing tool King Phisher. This release brings […]

defense

Prevent GPO from applying to your attack VM

You’re on an engagement and just obtained your first set of credentials. Score! You attempt to join your Windows VM […]

Interior Routing Protocols: The Basics

Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move […]

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]

recreation

Target Locked: Game Accounts

Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft […]

CTF Example – Coding

You sit there in front of your desk after getting hired in to a security position, and quickly realize that […]

CTF Example – Wireless Security

Each of SecureState’s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down […]