INFOSEC Hiding In Plain Sight With NTFS Steganography Steganography is the art of hiding data in plain sight, in this article Nihad Hassan takes a closer look at hiding data using the NTFS file system.
CYBERSEC Penetration Testing Scanning 101.2 Part two of the hugely popular Penetration Testing 101 series from security researcher Hozaifa Owaisi, who breaks down network tracing and the tools he uses to scan networks.
CYBERSEC The Secret History Of CRYPTO Learn about the secret history of the word CRYPTO and read about its roots in intelligence gathering and espionage with infosec writer Guise Bule.
INFOSEC Unboxing India's Data Protection Framework – Part One of Many In this article, infosec writer Ninad dissects the Indian Data Protection Framework and breaks it down for us so that we can better understand it.
CYBERSEC Featured The MEGA.nz Chrome Browser Extension Has Been Backdoored (UPDATE) The MEGA.nz Chrome Extension has been identified as backdoored in the newest version. It is stealing credentials for several services like GitHub and Google, which will be sent to an external website.
INFOSEC Infosec Writers Contest Sharpen your pencils and scribble up a storm, you have 3 weeks to submit an article and enter our $1000 writing contest.
TECHNICAL AWS Full Stackin’ w/ aaS This article from security researcher ZuphZuph will teach you about secure SaaS hosting within AWS. Everything here is generalized for the infotech/sec industries.
INFOSEC Black Hats Drive The Infosec Space We pretend that 'black hat' is a dirty term in the infosec space, but half of you would not earn half as much money as you do without them.
INFOSEC Apply For Infosec Jobs Like You Mean It Learn how to apply military strategy to your job hunt and apply for infosec jobs like you mean it, with security researcher Stuart Gentry.
TECHNICAL HackTheBox - Stratosphere Write-up Stratosphere retires this week at HTB. I really liked this box for its awesome privilege escalation (privesc) and the rabbit holes. So without further ado, this is your pilot Minato reporting, looks like there's some turbulence... Lets hit stratosphere!!!
TECHNICAL Web Application Firewall (WAF) Evasion Techniques #3 Uninitialized Bash variable to bypass WAF regular expression based filters and pattern matching. Let's show it can be done on CloudFlare WAF and ModSecurity OWASP CRS3
CYBERSEC So You Wanna Be A Hacker? This is a very basic article written especially for those of you who want to get started in hacking. If you are an elite hacker, be a pal by sending me your suggestions so I can update my article.
TECHNICAL HackTheBox - Celestial Writeup Celestial retires this week, it was a pretty cool box with a good vulnerability to look into. So without any further blabbering, lets get to r00t!
CYBERSEC Remember Fancy Bear? Fancy Bear is a cyber-espionage group that has recently become a household name due to the highly publicized Democratic National Committee (DNC) hack in 2016.
CYBERSEC HackTheBox- Rabbit Writeup This week Rabbit retires on HTB, it’s one of my favorite boxes and after joining the Secjuice writing team, I decided to publish my first ever write-up.
INFOSEC Cryptology : The Original Crypto Cryptology is the art and science that deals with both cryptography and cryptanalysis, lets dive into its two main components.
CYBERSEC Penetration Test Scanning 101 Lets take a look at the different types of attack involved in penetration test scanning and get a high level overview of how they work, with security researcher Hozaifa Owaisi.
TECHNICAL Finding The Real Origin IPs Hiding Behind CloudFlare or Tor Tor hidden services and reverse-proxy providers (e.g. CloudFlare) are useless if you are making simple mistakes. This is how you can reveal origin IPs when you make a mistake.
INFOSEC GhostShell - My Hacktivist Ideology I did a lot of things over the years, from publicly declaring cyberwar on political leaders, to hacking Wall Street and other high profile targets such as NASA, The Pentagon and FBI.
INFOSEC The Electric Vehicle Charge Attack Electric vehicles are all the rage. Little do we know we are becoming vulnerable to a cyber attack. This car salesman preys on his clients using the EV as his attack surface.
TECHNICAL Reverse Engineering My Own Website Security researcher Alessandro Innocenzi built his website using esoteric programming languages, a website that you have to first compile in order to get any information out of it.
INFOSEC Managing For Inclusion and Diversity We are the snake eating itself, cannibalistic and harmful. We fight over the inclusion, and value, of women or LGBT, proper human behavior and the credibility of certifications.
CYBERSEC Vegas - Where Thugs Come Into Your Room And Search Your Stuff Hotel thugs at DEFCON tried to burst into your room and photograph your things? You aren't alone, its happened to lots of DEFCON attendees.
OSINT The Art Of The Sock Sock puppets are where the OSINT rubber meets the HUMINT road, but you need to be good at using them to survive in the infosec jungle.
OSINT An Introduction To Open Source Intelligence (OSINT) Gathering An introduction to open source intelligence (OSINT) gathering, from renowned OSINT author Nihad Hassan.