Skip to content

Laconic Wolf

Building and Breaking Things…

  • Home
  • Penetration Testing
  • Python
  • PowerShell
  • Defense
  • Cloud
  • Forensics
  • /dev/random
  • Contact Us
Laconic Wolf
September 16, 2016 Jake

Methods to Avoid Command History

A common thing to do during post exploitation is to

Continue reading
September 13, 2016 Jake

Using Powershell for File Integrity

Powershell uses the Get-FileHash cmdlet to generate a unique hash

Continue reading
August 29, 2016 Jake

Sending Email with PowerShell

Largely taken from here and here, the following example shows

Continue reading
August 20, 2016 Jake

Critical Security Control One (CSC 1) – Inventory of Authorized and Unauthorized Devices

I created a poor man’s solution to CSC 1 by writing

Continue reading
August 15, 2016 Jake

Python PDF Merger

This post is to show how Python can be used

Continue reading
August 11, 2016 Jake

Sending Email with Python

This post is a simple example of sending email with

Continue reading
July 25, 2016 Jake

Automated OS Injection Reverse Shell with Mechanize Against DVWA

Damn Vulnerable Web Application (DVWA) is an intentionally vulnerable web

Continue reading
July 19, 2016 Jake

Stored Cross-site Scripting (XSS) Cookie Stealing with Mechanize and DVWA

Damn Vulnerable Web Application (DVWA) is an intentionally vulnerable web

Continue reading
June 22, 2016 Jake

Metasploit VB Macro Payload for Office Documents

This post is about using a metasploit generated payload to

Continue reading
June 15, 2016 Jake

Burp Suite Professional – handshake alert: unrecognized_name

I’ve received this error several times now, so I am

Continue reading

Posts navigation

«Previous Posts 1 … 4 5 6 7 8 Next Posts»

About me…

I’m an information security professional with a focus  on offensive security. My day job is in penetration testing, but I also have experience in host defense, audit, and system administration. When I’m not doing that, I enjoy coding, building things in the AWS cloud, and ultra running.

Follow me:

  • Facebook
  • Twitter
  • LinkedIn
  • GitHub
  • Flipboard
  • RSS Feed

Recent Posts

  • SANS 2019 Holiday Hack Frosty Keypad Challenge
  • Walkthrough: OWASP MSTG UnCrackable App – Android Level 1 – Part 2
  • Walkthrough: OWASP MSTG UnCrackable App – Android Level 1 – Part 1
  • Using Burp Suite with Android devices
  • Hashcat Tutorial – Rule Writing
Powered by WordPress and Wellington.