A while back I coded a Python tool (located here)
Continue readingCategory: Defense
The SMI protocol, and why Nessus is wrong
I was reviewing some port scan data and noticed port
Continue readingNmap Scan to CSV
I wrote a Python3 script that can parse an Nmap
Continue readingWhich Ports does Nmap Scan by Default?
Nmap is an excellent and popular network scanner. During a
Continue readingUsing Powershell for File Integrity
Powershell uses the Get-FileHash cmdlet to generate a unique hash
Continue readingCritical Security Control One (CSC 1) – Inventory of Authorized and Unauthorized Devices
I created a poor man’s solution to CSC 1 by writing
Continue readingAvoiding IDS Rules – Port Scanning
For research purposes, I have setup a Security Onion Virtual
Continue readingNmap Probing, Service Detection, and NSE Overview
Since Nmap is probably the most widely used port scanner
Continue readingCIS AWS Benchmark Script
Recently (2-29-2016) the Center for Internet Security (CIS) came out
Continue readingThe sethc backdoor…
I first head about this backdoor a long time ago and
Continue reading