Leif Gregory

42 Flips | 3 Magazines | 1 Like | 5 Following | @ldgregory | Keep up with Leif Gregory on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Leif Gregory”

How To: Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The …

Cybersecurity

Enterprise Security Architecture - a short overview

A security architecture‍ is a topic which has been more and more demanded, although stakeholders in organizations may still have quite different …

Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into …

How To Scan Your Computer For Malware With Google Chrome

In the 9-plus years it’s been around, Google Chrome has become one of the best — and most popular — web browsers in the world. One reason for its rapid rise has been Google’s focus on security.<p>Protecting Chrome users from malware remains a top priority today. What you may not have realized is that …

Google

Enumeration

<b>Table of Contents</b><p>Enumeration<p>Generic Enumeration<br>• HTTP Enumeration<br>• SSH Enumeration<br>• SMB Enumeraion<br>• SNMP Enumeration<p>Explotation<p>BOF Based Exploits<p>Weak …

Forensics

How To: Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, …

Forensics

11 Mistakes to Avoid When Grilling Steak, According to Chefs

Purists assert that a good-quality cut of steak is done ill justice at the hands of an overzealous grill. Contrast that to cheaper cuts like chuck …

BBQ

DNS-Persist

DNS-Persist is a post-exploitation agent which uses DNS for command and control. The server-side code is in Python and the agent is coded in C++. …

The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response<p>“Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging …

Abusing Windows Cached Credentials in Metasploit

This is a common issue I’ve run across that has several catch 22’s. What is the appropriate amount of cached credentials I should be setting in my …

I've Just Launched "Pwned Passwords" V2 With Half a Billion Passwords for Download

<b>Presently sponsored by:</b> Raygun APM is here! Now you can monitor every part of your application, together, in one place.Last August, I launched a …

How To: Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

Local port forwarding is good when you want to use SSH to pivot into a non-routable network. But if you want to access services on a network when you …

Linux

How to easily add an SSH fingerprint to your known_hosts file in Linux

If your Linux shell scripts are getting tripped up by SSH fingerprints, Jack Wallen has an easy solution to avoid the problem.<p>Let's say you've …

Linux

What Is an IPA? A Complete Guide to the India Pale Ale

The IPA is everywhere, but not all IPAs are the same. Learn about the 10 styles of IPA before you order your next round of beers.<p>“I hate IPAs. They’re bitter.”<p>“I love IPAs. They have so much alcohol in them.”<p>Those are the two most common things I hear people say about IPAs, and neither of them are …

Install Free SSL from Let’s Encrypt with Apache on Ubuntu

How to Install Free SSL from Let’s Encrypt with Apache on Ubuntu

IT security

Setting Up a Secure FTP Server using SSL/TLS on Ubuntu

In this tutorial, we will describe how to secure a FTP server (VSFTPD stands for “Very Secure FTP Daemon”) using SSL/TLS in Ubuntu 16.04/16.10. If …

SSL

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

LaZagne v2.3 - Credentials Recovery Project

The <b>LaZagne project</b> is an open source application used to <b>retrieve lots of passwords</b> stored on a local computer. Each software stores its passwords …

Forensics

A2SV – Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed

A2SV is a Python-based SSL Vulnerability focused tool that allows for auto-scanning and detection of the common and well-known SSL …

Information Security

Navigating the Mezcal Maze

Mezcal is a complex spirit that can be made from over 50 different agave plant species. Here are 11 recommended bottles to guide you through this …

Alcohol

These Bottles Of Booze Are Actually Worth The $100 Price Tag

There’s a <i>lot</i> of booze out there to choose from. It’s pretty easy to go into a shop and find a bottle of whiskey or rum that’s reasonably priced and walk away a happy camper. But we’ve all had the experience of standing in the aisle of our liquor store, staring at those higher shelves, too. We’ve …

Alcohol

The Best Dark Rums To Try For National Rum Day

The taste of rum is a sweet kiss from a far off land. There’s a little sand, salt, and sea in every bottle — reminders of the spirit’s long history with pirates, navies, and centuries of exploration (and brutal colonization). It’s the upcycled outcome of the sugar industry, discovered when African …

Rum

Cross-Site Request Forgery is dead!

After toiling with Cross-Site Request Forgery on the web for, well forever really, we finally have a proper solution. No technical burden on the site …

Information Security

But I'm Not A Security Tester! Security Testing On The Web For The Rest Of Us

by Kate Paulk<p>How It Started<p>Not long ago, security testing (and its equally scary cousin, penetration testing) was a big scary thing best left to …

Information Security

The Best Scotch Under $250

This guide is a part of a series. View our more affordable single malt Scotch whisky selections in our post entitled “10 Best Affordable Single …

Best American Single Malt Whiskey

Best American Single Malt Whiskey<p><b>The Tasting:</b><br>The Fifty Best held a “blind” tasting of 20 American malt whiskies with a panel of 16 judges. Strict …

Classic Rum Cocktails To Put Yourself On Island Time

Of all the liquors, rum is arguably the most cocktail-friendly.<p>If gin is the serious booze of serious people drinking serious cocktails like …

On the tequila trail in Mexico's Jalisco state

As Bordeaux is to France and Porto is to Portugal, Tequila is to Mexico: both a libation and a destination.<p>But not just anywhere in Mexico. The wellspring of tequila production is in the west-central state of Jalisco, home to Mexico's second-largest city, Guadalajara, as well as the nearby town of …

Mexico

The Bourbon Bucket List: 15 Bourbons You Need to Try at Least Once

No other drink is as American as bourbon. Eastern Europeans can carry the vodka flag, the Scottish can bring the best scotch, but we’ll take a bottle …