How Did I Get Here?

Networks are complex; even the simple ones can be. There are lots of reasons for this. For one it is just mind boggling how much engineering has to go into even the simplest network device. It would take an entire book just to describe in detail how a Raspberry PI works including the circuit diagrams, components, microcode, interfaces and a PI is practically a trinket in computer complexity. Beyond the complexity of the devices though is the number of paths that lead onto the network.

Read more →

Get WordPress (and others) Off Your Network

A few weeks ago The Hacker News had an article about how some recently discovered flaws in two popular WordPress plugins. These plugins are used by several million WordPress sites and either could be exploited to eventually gain remote code execution (RCE) on the servers. The article didn't say if the researchers did the 'responsible disclosure' thing and notified the authors, giving them time to fix the problem.

Read more →

Ransomware is for Everybody

I have a plan for small to medium sized companies to mitigate the risks and survive a ransomware attack.

Read more →

Decrypting Browser Passwords & Other 'Secrets'

In my last blog post I covered some news out of Trend Micro about malware exfiling browser login data. Trend Micro stops short of showing how to decrypt the passwords so I went looking for some code that did the deed but came up short. But I wanted it. I wanted it a lot.

Read more →

Hackers Can Read Your Browser Passwords

Trend Micro has an article published in December that is super exciting reading if you're the sort of person who gets excited about revealing all of a user's plaintext Internet passwords during an engagement. I am just that sort of person.

Read more →