Development Forcing A Video Takeover of Your Target's Desktop Using the Filter Graph COM Object Do you like locking people's computers? How about forcing them to watch whatever video you please? Well do I have a program for you.
OSINT Weaponizing Search Engines No, we're not talking about whale reproductive organs, kids. This is using dorking on platforms in order to conduct reconnaissance against different industries to gain key information against potential targets.
kernel Intro to Windows Kernel Development Most programmers shutter at the thought of kernel programming, but it's a beast that can be tamed. This is a start of a kernel development series where I'll explain some of the basics before entering more advanced topics. Art by: https://www.behance.net/tony631163f27b
Windows Introduction to Kerberos Active Directory Domains run their authentication with Kerberos, therefore we must break it. This is an introduction to the Kerberos protocol.
Cloud Creating a Network for an Active Directory Domain in the Cloud Setting up a network for a domain in the "elusive" cloud can prove to be a minor challenge when working with the pedantic syntax that Microsoft creates for its admins. Check out how to build a small network for a domain! (art by: https://twitter.com/yuwuta_ryebrook)
Physical Security Your University's Security Sucks This is about a hobby of sneaking into University's facilities for the lulz and to point out common physical security vulnerabilities.
Space Looking at Earth Through the Eyes of a Satellite The process of intercepting images from the GOES16 NASA/NOAA run satellite for oogles and lulz
Windows Windows Privilege Escalation 1 Going through some of the methods an attacker can use to privilege escalate in Windows based environments.
GameHacking Unity Game Hacking As we get deeper into game hacking, we'll be taking a look at some techniques you can use against the Unity game engine
OSINT One Wrong Phone Call The story of how I uncovered a scam operation in the United States off of a 2 minute phone call.
GameHacking Following the White Rabbit In Game Recently, someone let me know of a CTF that actually had game hacking as a part of it so of course I had to take a crack at it. This is the first of two challenges for this exercise.
0-Day How I Found a 0-Day and Got Snubbed by a Company To start, I won't say who the exact company is for legal reasons. I really don't feel like getting sued. I do feel like talking about a common situation of developers not caring about the product their company produces. Now I'm not going to say the devs behind this software
GameHacking All Your Base Are Belong to Pointers Here we'll take a look how we can get to base pointers in order to change a value that affects our in-game value.
GameHacking Intro to Game Hacking Imagine being able to make your own cheats in a virtual world legally. This'll talk about the extreme basics and some of the legal aspects of game hacking.