Booting up20 Mar 2017
This is the first post in the lab, a first intent to view content and also a way to get to know how the Jekyll platform works.
It’s the start, the booting process. By know there are some interests that I’d like to write about.
- Crypto and crypto attacks. Well, it’s like really really simple, if you try something outside the standards and the standards implementation chances are you are vulnerable. Crypto errors are like the new buffer overflow errors we’ve exploited.
- CTF Walkthroughs. CTFs are fun games and a sort of reality check when talking about pentesting. If you are having problems to own a Virtual Machine created to be owned, that means containing vulnerable software installations and configurations, and, also giving any sort of clues of how to “solve” or get to the next flag. You will feel like on hell when trying to pentest a real scenario, where one or more specialists have put effort on securing all boxes.
- Tools I’ve used and/or created. As a way to share knowledge and process.
- Some other attacks I find really interesting but I’ve left them for a future like wireless attacks and hardware hacking, lockpicking, in-site attacks (raspberrys, homemade antennas, bad usbs, etc) and social engineering.
Let’s keep booting and see you soon!