Blog

Open Security WWHF CTF Writeup
One Coin to Rule them All! Colors Solution: Colors Challenge Looking at the source for this challenge, we can see a few elements that are not displayed within the website itself. We can see various strings of Base64, and colors

Facebook’s Gut Punch
Facebook’s Gut Punch Looking at the internal impact of a total network failure In case you hadn’t heard, Facebook went down. And of course, when someone says, “Facebook went down,” it covers much more than facebook.com. Instagram, Oculus, and WhatsApp,

Considerations For Your Next Penetration Test
Whether this is your first time looking for a penetration test, or you’re just interested in a refresher on what you need to do on your end, here at Open Security, we have you covered. We want to do our

Penetration Testing – Expectation vs Reality
Figuring out what actually constitutes a penetration test can be a surprisingly tough question to resolve. Between scanning vendors exaggerated claims and a misunderstanding of what real-world penetration testing can produce, it can take a CISSP to untangle the details.

Way West HF – Journey to a Coin
2021 Way West Hackin’ Fest was a great conference in that it did have something for all attendees (remote or in-person) including its numerous CTFs, labs, workshops, and high-quality talks. As this was my first time attending the conference, I

Wargaming GIAC Certifications
Voltaire is a web-based indexing tool for GIAC certification examinations. Creating an index with Voltaire is a simple three phase process involving: documentation/note-taking, sorting & normalization, and word processing. Voltaire Website: https://voltaire.publickey.io As a SANS instructor one of the things

Data vs Damage: Comparing Threats and Risks Between IT and OT
Any company that wants to maintain a competitive edge in today’s global economy needs to work faster, cheaper, longer, and more precisely than ever before. In the wake of a pandemic that ran employees out of the office for over

A Lesson Learned From The World’s Most Famous Hacker
I woke up excited. It’s my birthday. The day I eat whatever I want, my wife and kids are nice to me, and things are generally groovy all day long. I open my email and there’s a gift from my

COVID-19 Cyberattacks
Scams and cyber-attacks based around COVID-19 misinformation are on the rise. The following is a regularly updated list of legitimate data from sources such as the WHO, CDC, and John Hopkins University. https://www.who.int/emergencies/diseases/novel-coronavirus-2019 https://www.cdc.gov/coronavirus/2019-ncov/index.html https://coronavirus.jhu.edu Staying safe while at home