BloodHound is a fantastic tool for analyzing Active Directory, but that’s really just the beginning. The BloodHound database is a resource that enables users to execute all sorts of queries – the only limit is your creativity. In this case study, the SpecterOps team used BloodHound to assist with an...
[Read More]
Making a Proton Pack
An Adventure in Constructing a Ghostbusters Proton Pack
I recently completed my Ghostbusters ghost trap and decided to begin tackling a project I always wanted to do, my proton pack.
[Read More]
Exploring What Goes on Behind the Scenes with Win32 Shellcode Stagers
A look at how a stager works in Assembly
I recently challenged myself to manually write a Windows shellcode stager that could be used to create space for second stage shellcode in an exploit. This is usually the realm of Metasploit and not something you want to write yourself, but the best way to learn something is to get...
[Read More]
The Impact of Information Security on the Video Game Industry
This is my thesis I wrote for my B.S. in Information Security & Intelligence from Ferris State University. I worked with some great people in the video game industry and the media to put this together. It turned out very well, but it’s a monster at 80 pages. If you want to...
[Read More]