Blogs

Quick Notes on using Incus to run a .OVA File
|Published: November 30, 2024
|How to use a .OVA in Incus

A Guide To Kubernetes Logs That Isn't A Vendor Pitch
|Published: June 1, 2024
|A guide to logging at each cluster layer with a focus on AuditPolicy.

The Certification Industrial Complex
|Published: January 22, 2024
|The Certification Industrial Complex and other Cyber Education Embarrassments

Human Memory Management: Techniques For Actionable Security Research
|Published: October 11, 2023
|How to utilize an atomic note taking system to effectively research new topics and advance your career.

An Excruciatingly Detailed Guide To SSH (But Only The Things I Actually Find Useful)
|Published: August 22, 2023
|Oh you like SSH? Name every flag.

Zero Effort Private Key Compromise: Abusing SSH-Agent For Lateral Movement
|Published: August 18, 2023
|A walkthrough of compromising private keys in SSH-Agent for post-exploitation lateral movement shenanigans.

How I Got Hired On Google's Red Team
|Published: July 1, 2023
|A summary of all the information I learned while looking for new jobs and how I ended up getting hired on Google's red team.

Why I'm Learning Rust
|Published: March 21, 2023
|Why I'm Learning Rust For Security Work In 2023

My 2022 Security Year In Review
|Published: December 31, 2022
|Looking back on 2022 and looking forward into 2023: What I learned and what I hope to learn.

How To Setup Spotify-TUI and Spotifyd With Pulseaudio.
|Published: December 18, 2022
|How to be a Linux elitist and play music from your T E R M I N A L

Wandering Vagrant: A Crash Course in Vagrant Virtual Machines
|Published: December 15, 2022
|A crash course of all the disparate knowledge I wish I had when I first delved into Vagrant

Graham's Guide To Doing Things
|Published: November 6, 2022
|A collection of tips I use to focus on my most important tasks.

Do As I Say, Not As I Do: Should You Get A Master's Degree In CyberSecurity?
|Published: July 31, 2022
|A discussion of the pros and cons of getting a masters degree in the cybersecurity field.

Spoofing Youtube For Fun And Profit: An Examination Of Punycode For Phishing
|Published: January 30, 2022
|Exploring some of the interesting edge cases when it comes to buying domains with non-standard characters!

Creating an Infosec/IT Blog part 2: A Power User's Guide to Creating a Blog
|Published: January 3, 2022
|Blogs are *kind* of a big deal in the InfoSec community. Here is how I made mine.

Next page ->