The day has finally come, it’s time to build our first official Network Operations Center (NOC) for my business. I never expected this day to come so early, but with proven results, the customer base has grown very quickly. I’m proud to say I’ve went from zero to over 95 sites protected of
Recently, I've been doing a lot of penetration test reports. It's given me lots more insight on forming a better report, my initial reports were subpar at-best now that I've done dozens of them. I thought I'd make this post and share some tricks I've learned along the way, and things to avoid.
I received an alert from my filtering provider that my server was under attack. It was on the IP used for the internet gateway, which is interesting as I’ve kept everything pretty hidden with Cloudflare, firewall rules, and extra configuration. It felt like a targeted attack, but what caused this? The attack started around
Being an adult with no post-secondary education can be challenging when it comes to getting jobs. I'm fortunate in my current job that my boss is also self-taught and gives everyone an equal and fair chance, however, when in front of my peers who have post-secondary education I'm treated as if I don't
I love to learn, break, and fix -- usually not in that order. After trying different avenues of security (red team / blue team), I find the most joy being on the red team. The rush of breaking into things, maintaining presence, and snooping outweighs the rest. As I'm learning more, I'm documenting the
I was browsing Hack The Box today, and decided to tackle a new box, the box I saw was Networked, it's made by Guly and looks like a fairly easy box, so let's get exploiting! The machine lives on 10.10.10.146, a quick nmap scan shows port 22 and 80 are open, so we know