Prevent GPO from applying to your attack VM

You’re on an engagement and just obtained your first set of credentials. Score! You attempt to join your Windows VM […]

Interior Routing Protocols: The Basics

Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move […]

Segmenting, Subnetting and You

I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit […]

Block Cipher Modes of Operation: A Primer

Block ciphers, as the name suggests, encrypt a cleartext by splitting it into individual blocks. Therefore, a key property of […]

Flash….Thunder!

So another year has passed and what an active year it was, chocked full of security events, breaches, and account […]

Defending Web Apps: WAFs versus RASPs

Edsger Dijkstra once famously stated, “Testing shows the presence, not the absence of bugs.” Accordingly, even well-tested web applications written by […]