A Beginner’s Guide to the CVE process

Before I got into the security field full time, I made it my goal to someday discover a previously unpublished […]

Building a Vulnerable Box – HFS Revisted

A few months ago, in the Building a Vulnerable Box series, I wrote a walkthrough for putting together and compromising […]

Building a Vulnerable Box – Rejetto HFS

Happy Friday. Today’s vulnerable box was not particularly difficult to set up, but I like the exploit. I am also […]

Building a Vulnerable Box – Elastix

This spring, I had the opportunity to teach Network Security at a local university. As one would expect, I chose […]