Hacking a cheap security camera DVRI had some free time this weekend, so I decided to poke around at this old DVR for a security camera system (ZOSI ZR08ZN) I had laying…Oct 30, 2023Oct 30, 2023
Published inLevel Up CodingGetting Started with Semgrep on UbuntuSifting through countless lines of code to identify potential security risks isn’t how I want to spend my time. Unless you really hate…Feb 26, 2023Feb 26, 2023
Published inLevel Up CodingSecuring NGINX: Configuring SSL and Much MoreIf you’re scratching your head trying to figure out how to get NGINX to serve your web content over HTTPS, I’m here to help. While you’re…Feb 24, 2023Feb 24, 2023
Published inSystem WeaknessHow to Hack WPA2 Enterprise Networks (OSWP Prep)On the back of my (sort of) recent OSWP certification, I wanted to share some insight on how to tackle one of the more complicated wireless…Oct 11, 20221Oct 11, 20221
Published inProduct Security for HackersHere are 3 Open-Source Product Security Tools You Should Be UsingAnyone working in Security (or IT, Privacy, Compliance..) knows there is no shortage of tooling to spend money on. I’m betting that at…Oct 7, 202211Oct 7, 202211
Published inProduct Security for HackersHow to clean up your awful Git commit historyI wanted take a moment to talk about something you’ve been avoiding for a while now. I don’t know how else to say this: your commit history…Oct 6, 20221Oct 6, 20221
Secure your IoT products like your business depends on itThe early days of IoT, which are just barely behind us, were basically the wild west in terms of security. If implemented at all, security…Apr 13, 2022Apr 13, 2022
Overview of OWASP Top 10 for 2021The OWASP Top Ten is a list of web application security vulnerabilities, released by the Open Web Application Security Project that “is…Oct 12, 2021Oct 12, 2021
MSFVenom CheatsheetMSFVenom, if you’re not already familiar, is the payload creating cousin of Metasploit. With it, you can create a wide variety of…Oct 4, 2021Oct 4, 2021
The Social Engineer’s Guide to Phishing: Part IIIn the first part of the series, we spoke about the psychology behind successful phishing techniques, and how to choose the right tools for…Sep 29, 2021Sep 29, 2021