Archives
- 10 Dec hardening SSH: the low-hanging fruit most people skip
- 03 Oct passive OSINT: mapping an attack surface before you touch anything
- 14 Aug capturing and reading traffic with tcpdump
- 20 Jul rootless, immutable, and open: rethinking the modern tech stack
- 25 Jun securing my lab: lessons that can scale to the enterprise
- 15 Jun scanning for rootkits on linux with chkrootkit
- 01 Jun log analysis for activity detection
- 24 May automation of IP removal from an allow list thanks to python
- 13 May Incident Journal: Events & Experiences
- 12 May file integrity verification with hashing using CertUtil
- 09 May blocking SMB via windows firewall & reducing lateral movement
- 08 May intercepting HTTP logins with Wireshark
- 07 May analyzing a TCP handshake in Wireshark
- 06 May SSH & DNS analysis
- 05 May nmap local open port scan