CSS, short for Cascading Style Sheets, is a stylesheet language used to control the appearance and layout of web pages. Introduced by the World Wide Web Consortium (W3C) in 1996, CSS separates the content of a website (structured with HTML) from its visual presentation, allowing developers to create aesthetically pleasing and user-friendly designs. Core Concepts Read More …
Tag: tmack
Conference Video – Win32 Exploit Development With Mona and the MSF Framework
In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …
Don’t track my kids
A blurb of a post this time, but something I want to make sure everyone is aware of. Remember, Remember If your kids are a member Then they became the product and the future is out of luck Don’t track my kids We need to make sure our kids get a chance to be kids, Read More …
BGP: The Backbone of Internet Routing and Its Security Challenges
In the vast and interconnected world of the Internet, one of the most critical protocols ensuring the flow of data is Border Gateway Protocol (BGP). BGP is the routing protocol that enables different autonomous systems to communicate and exchange routing information. Without BGP, the Internet as we know it would not be able to function, Read More …
Conference Video – Dirty Red Team tricks
Let’s time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East and Mid Atlantic Collegiate Cyber Defense competition events. Raphael Mudge, the developer of the Armitage Metasploit GUI, will guide you on this journey. You will learn how to automate Metasploit, nmap, and Read More …
Notes – Cost Effectiveness & Specialized Hardware
Specialized hardware can enhance cost-effectiveness in specific applications, offering optimized performance and reduced expenses when compared to general-purpose solutions, but the decision depends on the specific needs and application. Here’s a more detailed breakdown: Why Specialized Hardware Can Be Cost-Effective: Optimized Performance: Specialized hardware is designed for particular tasks, enabling them to perform those tasks Read More …
InfoSec TV – Decoupling CI from CD with ArgoCD
In this video we are going to cover Decoupling CI from CD with ArgoCD Image Updater
GRE Tunnels in Modern Networking
In the world of modern networking, flexibility, security, and efficiency are paramount. As the Internet continues to evolve, so do the methods by which data is transmitted across complex infrastructures. One such method is the use of Generic Routing Encapsulation (GRE) tunnels. In this article, we’ll explain what a GRE tunnel is, how it works, Read More …
North Korea infiltrates crypto markets
N. Korea infiltrates crypto markets Google Gemini However, I can provide you with general information about North Korea’s involvement in the cryptocurrency industry, which is a widely reported topic: Sanctions Evasion: North Korea faces strict international sanctions due to its nuclear weapons program. Cryptocurrency offers a way to bypass traditional financial systems and evade these Read More …
Conference Video – Offensive Countermeasures: Still trying to bring sexy back
Why is it that the Hackers and Penetration Testers get to have all of the “sexy” fun? In this presentation we will cover some cool tricks to confuse, block or mislead attackers. Penetration testers may be angered during this presentation as we will describe how to make their lives difficult. The term “hacking back” will Read More …