Category: Uncategorized
-
Crowdstrike Insider Threat
The CrowdStrike insider threat incident in November 2025 stands as a crucial illustration of how the insider threat continues to be a top concern, regardless of an organization’s size or technical sophistication. Despite advanced defenses and frequent penetration tests (pentests), the insider threat remains uniquely positioned to bypass security measures, highlighting why it demands special…
-
Chinese CyberAttack – China Doesn’t like Us
China is not happy with me. I was recently glancing over this site’s analytics and noticed something interesting that occurred beginning Oct 30th. Before I address the 2 events that I’m going to write about, just as I currently write about them, I’m also currently addressing a DMARC / DKIM email spoofing attempt from this…
-
Sacramento Pentest
From Capital City to Cybersecurity Hub: Sacramento’s Digital Transformation Sacramento, California’s capital city, has been steadily evolving into a significant tech center with a growing focus on cybersecurity. Known for its rich history and government presence, Sacramento is now emerging as a dynamic tech ecosystem, showcasing its adaptability and innovative spirit. The sacramento pentest initiative…
-
Boston Penetration Testing
As cyber threats continue to evolve and become more sophisticated, the city of Boston has recognized the need to enhance its cybersecurity measures. In response, Boston has launched the Boston Penetration Testing Initiative, a comprehensive program aimed at improving the cybersecurity posture of businesses and government entities across the city through rigorous penetration testing (pentesting)…
-
SSRF Cheatsheet: Comprehensive Guide
Server-Side Request Forgery (SSRF) is a critical web application vulnerability that allows attackers to manipulate server-side requests. This SSRF cheatsheet provides an extensive collection of techniques to bypass security filters and exploit SSRF vulnerabilities. Whether you’re a penetration tester, security researcher, or developer, this guide will enhance your understanding of SSRF attacks and defenses. (Be…
-
Nmap Cheatsheet: Mastering Network Scanning
The nmap cheatsheet is an indispensable resource for network administrators, security professionals, and ethical hackers. This comprehensive guide will walk you through the various features and techniques of nmap, empowering you to conduct thorough network reconnaissance and vulnerability assessments. 1.2 Why Use Nmap? Nmap is versatile, powerful, and constantly updated, making it essential for network…
-
RegreSSHion Ip Scanner Tool
This is my RegreSSHion ip scanner written in GO. It can find single ip’s, cidr’s, ip’s from a file, and checks for different ports. This will be more effective than any Python written scanner simply because you can do concurrent scans against very long lists of ip’s, and hence, it’s much Quicker. I’ve already seen…
-
RegreSSHion Exploit
After you’ve checked for RegreSSHion bug check on your servers openSSH protocol, (there is a list of vulnerable devices out there btw, over 2.5 million), be sure to check out this code exploit. (RegreSSHion Ip Scanner tool here ) Will this become the cve-2024-6387 exploit ? (Try it locally only!) RegreSSHion exploit code written in…
-
RegreSSHion OpenSSH Bug Check
The Recent OpenSSH Vulnerability (CVE-2023-38408): Update : July 3, 24 12:46 pm – Exploit code link here. RegreSSHion Ip Scanner tool here. This vulnerability, discovered in July 2023, affects OpenSSH versions 9.3 and 9.3p1. It’s specifically related to the implementation of RSA keys with SHA-2 signature algorithms. Read on for more on the RegreSSHion OpenSSH…
-
Chicago Penetration Testing
From Windy City to Cyber Sentinel: Chicago’s Digital Security Renaissance Chicago, Illinois, known as the “Windy City,” has been quietly transforming into a burgeoning tech hub with a growing focus on cybersecurity. The city’s journey from an industrial and financial powerhouse to a dynamic tech ecosystem is a testament to its adaptability and innovative spirit.…