rewks
Cover image for the blog post
Automating a simple Velociraptor deployment in AWS (Part 3)
Posted on 2023-04-16
The final part - I go over creation an Ansible playbook which will configure the Velociraptor server
VELOCIRAPTOR INCIDENT RESPONSE AUTOMATION ANSIBLE AWS
Cover image for the blog post
Automating a simple Velociraptor deployment in AWS (Part 2)
Posted on 2023-04-15
Finally following on from part 1, I go through the creation of a Terraform script to set up necessary infrastructure
VELOCIRAPTOR INCIDENT RESPONSE AUTOMATION TERRAFORM AWS
Cover image for the blog post
CRTO Course and Exam Review
Posted on 2023-04-08
A review of the Certified Red Team Operator course offered by Zero Point Security
CRTO CERTIFICATIONS ZERO-POINT SECURITY
Cover image for the blog post
AI Art - A gateway to our own imagination
Posted on 2023-03-06
Does AI generated art spell doom for human artists?
AI STABLE-DIFFUSION MIDJOURNEY MACHINE LEARNING
Cover image for the blog post
Setting up interfaces and testing across VLANs
Posted on 2022-12-14
A short outline on how to configure interfaces with a VLAN id (Kubuntu 22.04)
VLAN NETWORKING CISCO LAB
Cover image for the blog post
Automating a simple Velociraptor deployment in AWS (Part 1)
Posted on 2022-11-01
I take a peek into the world of devops and infrastructure as code using Terraform and Ansible.
VELOCIRAPTOR INCIDENT RESPONSE AUTOMATION TERRAFORM AWS
Cover image for the blog post
Cyber Apocalypse CTF 2022: Red Island [web - 325pts]
Posted on 2022-05-19
For this web challenge we'll chain together multiple vulnerabilities, starting from a simple SSRF and resulting in RCE through a Redis service.
SSRF REDIS RCE CTF
Cover image for the blog post
The future's bright, the future's ... Fuchsia?
Posted on 2022-04-26
In this blog I take an introductory look into Google's fledgeling operating system. What is the idea behind it, and what is the current state? Is it ready to use?
GOOGLE OPERATING SYSTEM OS FUCHSIA
Cover image for the blog post
PicoCTF 2022: Noted [web - 500pts]
Posted on 2022-03-27
To solve this challenge we need to make use of stored cross-site scripting (XSS) as well as server-side request forgery (SSRF) whilst taking advantage of an automated user in the form of a headless chrome browser.
XSS SAME ORIGIN POLICY JAVASCRIPT CTF PICO
Page: 1