logical

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]

physical

Do it Live! – Social Engineering Training

Social engineering one of the most utilized attack vectors used in real world breaches. These come in the form of […]

research

A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

development

King Phisher Release 1.7

Today we’re proud to release the latest version of King Phisher, 1.7. Since the last release, we have added two […]

defense

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]

Block Cipher Modes of Operation: A Primer

Block ciphers, as the name suggests, encrypt a cleartext by splitting it into individual blocks. Therefore, a key property of […]

Flash….Thunder!

So another year has passed and what an active year it was, chocked full of security events, breaches, and account […]

recreation

Target Locked: Game Accounts

Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft […]

CTF Example – Coding

You sit there in front of your desk after getting hired in to a security position, and quickly realize that […]

CTF Example – Wireless Security

Each of SecureState’s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down […]