Log4j Kubernetes Network Policy or Blocking External Traffic will Slightly Reduce log4j Attack, not… blocking external egress from your applications is not only unrealistic for many but also doesn’t mitigate (avoid) the issue… only slightly
Security Quantum computing won’t stop your encrypted communications from being hacked I recently watched a TED presentation on quantum computing in which the presenter did a great job of explaining the benefits; however, they…
Gaming The original Xbox was my first hacker project in middle school I remember playing the original Xbox back in the early 2000s, I played more games back then, unlike today. I still play video games, just…
DNS Command and Control via DNS, without being obvious There’s plenty of ways to make a Command and Control, the whole purpose is to reliably communicate with your zombies in a way others…
Hacking I have my data exfiltration program stealing files too. [’0110100’, '0110101’, '0111000’, '0110111’, '0111001’, '0110110’, '0110101’, '0110011’, '0110001’, '0110010’, '0110100’, '0110101’…
Networking Data exfiltration using valid ICMP packets I was thinking about how someone could go about doing data exfiltration in an average enterprise with decent security. I’m assuming DNS…
Linux Linux bricking/breaking UEFI/BIOS is an egg on OEM’s faces too Apparently Ubuntu was bricking some Lenovo laptops because it was screwing up the BIOS causing things like setting to not be saved when…