Blogs
A Guide To Kubernetes Logs That Isn't A Vendor Pitch|
Published: June 1, 2024
|
A guide to logging at each cluster layer with a focus on AuditPolicy.
The Certification Industrial Complex
|
Published: January 22, 2024
|
The Certification Industrial Complex and other Cyber Education Embarrassments
Human Memory Management: Techniques For Actionable Security Research
|
Published: October 11, 2023
|
How to utilize an atomic note taking system to effectively research new topics and advance your career.
An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful)
|
Published: August 22, 2023
|
Oh you like SSH? Name every flag.
Zero Effort Private Key Compromise: Abusing SSH-Agent For Lateral Movement
|
Published: August 18, 2023
|
A walkthrough of compromising private keys in SSH-Agent for post-exploitation lateral movement shenanigans.
How I Got Hired On Google's Red Team
|
Published: July 1, 2023
|
A summary of all the information I learned while looking for new jobs and how I ended up getting hired on Google's red team.
Why I'm Learning Rust
|
Published: March 21, 2023
|
Why I'm Learning Rust For Security Work In 2023
My 2022 Security Year In Review
|
Published: December 31, 2022
|
Looking back on 2022 and looking forward into 2023: What I learned and what I hope to learn.
How To Setup Spotify-TUI and Spotifyd With Pulseaudio.
|
Published: December 18, 2022
|
How to be a Linux elitist and play music from your T E R M I N A L
Wandering Vagrant: A Crash Course in Vagrant Virtual Machines
|
Published: December 15, 2022
|
A crash course of all the disparate knowledge I wish I had when I first delved into Vagrant
Graham's Guide To Doing Things
|
Published: November 6, 2022
|
A collection of tips I use to focus on my most important tasks.
Do As I Say, Not As I Do: Should You Get A Master's Degree In CyberSecurity?
|
Published: July 31, 2022
|
A discussion of the pros and cons of getting a masters degree in the cybersecurity field.
Spoofing Youtube For Fun And Profit: An Examination Of Punycode For Phishing
|
Published: January 30, 2022
|
Exploring some of the interesting edge cases when it comes to buying domains with non-standard characters!
Creating an Infosec/IT Blog part 2: A Power User's Guide to Creating a Blog
|
Published: January 3, 2022
|
Blogs are *kind* of a big deal in the InfoSec community. Here is how I made mine.
Creating An Infosec/IT Blog Part 1 Why You Should Create A Blog
|
Published: January 1, 2022
|
Blogs are *kind* of a big deal in the InfoSec community. Here is why you should have one.