SEO Poisoning (or Search Engine Optimization Poisoning) is a type of social engineering attack that targets an unsuspecting user, or maybe someone who is in a hurry and not paying close attention. These are typically used by bad guys to fool unsuspecting users into clicking their links and going to the wrong website, or worse Read More …
Author: tmack
Camp IT DR/BCP Conference Thoughts
Recently I attended a Camp IT Conference hosted at the Stephens Convention center in Rosemont Illinois. This particular conference was Disaster Recovery / Business Continuity – Resilient Infrastructure. While the Convention center in Rosemont is cavernous, our group was off to the side in the Executive areas. Next time I will remember to take photos! Read More …
Windows Stuff from GREM Exam
Here are some of the Windows API things that I have on older flashcards that I am adding to this site. Yes. flashcards. I used them to pass my GREM exam from SANS. GetAsychKeyState GetProcAddress Memory Registers EIP
Want to Learn Python
@simonholdorf for these 20 Beginner Python Projects 3 Python Automation Projects – For Beginners 15 Python Projects in Under 15 Minutes 5 Unique Python Projects 12 Beginner Python Projects 5 Mini Python Projects – For Beginners
Want to Learn Linux
Here are some sources to get you started! Thanks to @simonholdorf for the links! Linux Operating System – Crash Course for Beginners The Complete Linux Course Linux Command Line Full course Linux File System/Structure Explained! Linux for Ethical Hackers (Kali Linux Tutorial)
2022 Defcon Video Playlist
For those who do now know of Defcon, this is the Hacker conference that started them all. Just a quick post of the Video Playlist from this year’s conference. Sick Codes – Hacking the Farm = Breaking Badly into Agricultural Devices Aviv Sassoon -The Journey From Isolated Container to Cluster Admin Wietze Beukema – Save Read More …
Find an APT
MITRE Groups Thai CERT – Electronic Transactions Development Agency
Notes :: Getting around some Defenses
Trying to read up on this for some work things. Dropping a few links here. Will add more notes as I go on. —————————————————————— bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis “”” It’s worth noting that not all the functions get hijacked by AVs/EDRs. Usually only those functions that are known to be abused over and over again in the wiled that Read More …