Figuring out what actually constitutes a penetration test can be a surprisingly tough question to resolve. Between scanning vendors exaggerated claims and a misunderstanding of what real-world penetration testing can produce, it can take a CISSP to untangle the details.
Voltaire is a web-based indexing tool for GIAC certification examinations. Creating an index with Voltaire is a simple three phase process involving: documentation/note-taking, sorting & normalization, and word processing. Voltaire Website: https://voltaire.publickey.io As a SANS instructor one of the things
Any company that wants to maintain a competitive edge in today’s global economy needs to work faster, cheaper, longer, and more precisely than ever before. In the wake of a pandemic that ran employees out of the office for over
I woke up excited. It’s my birthday. The day I eat whatever I want, my wife and kids are nice to me, and things are generally groovy all day long. I open my email and there’s a gift from my
Scams and cyber-attacks based around COVID-19 misinformation are on the rise. The following is a regularly updated list of legitimate data from sources such as the WHO, CDC, and John Hopkins University. https://www.who.int/emergencies/diseases/novel-coronavirus-2019 https://www.cdc.gov/coronavirus/2019-ncov/index.html https://coronavirus.jhu.edu Staying safe while at home
tl;dr To avoid dependency issues take advantage of built in Java functionality provided by the Sleep scripting language used to write Cobalt Strike Aggressor Scripts. This post examines making web requests without passing execution to an external binary and also discusses using