logical

Interior Routing Protocols: The Basics

Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move […]

physical

Dirty Deeds…. On Video

Recently the team and I were engaged in a physical penetration test where our goal was to gain access to […]

research

A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

development

King Phisher Release 1.8

The King Phisher version 1.8 has arrived with the following changes: Warn Python 2.7 users that this is the last […]

defense

Interior Routing Protocols: The Basics

Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move […]

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]

Block Cipher Modes of Operation: A Primer

Block ciphers, as the name suggests, encrypt a cleartext by splitting it into individual blocks. Therefore, a key property of […]

recreation

Target Locked: Game Accounts

Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft […]

CTF Example – Coding

You sit there in front of your desk after getting hired in to a security position, and quickly realize that […]

CTF Example – Wireless Security

Each of SecureState’s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down […]