Skip to content

Laconic Wolf

Building and Breaking Things…

  • Home
  • Penetration Testing
  • Python
  • PowerShell
  • Defense
  • Cloud
  • Forensics
  • /dev/random
  • Contact Us
Laconic Wolf

Category: Defense

August 13, 2018 Jake

Writing and fixing vulnerable XML parsing code in Python

A while back I coded a Python tool (located here)

Continue reading
April 4, 2018 Jake

The SMI protocol, and why Nessus is wrong

I was reviewing some port scan data and noticed port

Continue reading
February 4, 2018 Jake

Nmap Scan to CSV

I wrote a Python3 script that can parse an Nmap

Continue reading
June 14, 2017 Jake

Which Ports does Nmap Scan by Default?

Nmap is an excellent and popular network scanner. During a

Continue reading
September 13, 2016 Jake

Using Powershell for File Integrity

Powershell uses the Get-FileHash cmdlet to generate a unique hash

Continue reading
August 20, 2016 Jake

Critical Security Control One (CSC 1) – Inventory of Authorized and Unauthorized Devices

I created a poor man’s solution to CSC 1 by writing

Continue reading
June 3, 2016 Jake

Avoiding IDS Rules – Port Scanning

For research purposes, I have setup a Security Onion Virtual

Continue reading
April 1, 2016 Jake

Nmap Probing, Service Detection, and NSE Overview

Since Nmap is probably the most widely used port scanner

Continue reading
March 10, 2016 Jake

CIS AWS Benchmark Script

Recently (2-29-2016) the Center for Internet Security (CIS) came out

Continue reading
February 25, 2016 Jake

The sethc backdoor…

I first head about this backdoor a long time ago and

Continue reading

About me…

I’m an information security professional with a focus  on offensive security. My day job is in penetration testing, but I also have experience in host defense, audit, and system administration. When I’m not doing that, I enjoy coding, building things in the AWS cloud, and ultra running.

Follow me:

  • Facebook
  • Twitter
  • LinkedIn
  • GitHub
  • Flipboard
  • RSS Feed

Recent Posts

  • SANS 2019 Holiday Hack Frosty Keypad Challenge
  • Walkthrough: OWASP MSTG UnCrackable App – Android Level 1 – Part 2
  • Walkthrough: OWASP MSTG UnCrackable App – Android Level 1 – Part 1
  • Using Burp Suite with Android devices
  • Hashcat Tutorial – Rule Writing
Powered by WordPress and Wellington.