Command and Control

Before I start in on this I just want to apologize for the lack of updates. I’ve been trying to get back working and that does take up most of my time. This is going to be a series of articles focusing on the Command & Control forensic challenges from Root-Me.org. These mainly focus on […]

Marshall in the middle.

This challenge is from the Hack The Box Forensic challenge library. Again, if you’re looking to crib the flag from this write up, you’re going to be disappointed.   The scenario is that the SOC  flagged some suspicious activity on one of the production servers. They can’t determine if any data was stolen, and passed […]

It’s been a while…

So, it’s been literally over a year since my last blog post. Yeah, I suck at blogging. Also, Life happened, so there’s that.  In the middle of 2018 I decided I needed out of the help desk jail, and looked at  becoming a Digital Forensics Specialist. Thanks to Brett Shavers, Stu, and the awesome people […]

Digital signatures, hashes, and ravens

Today I’ll go over the concept of digital signatures, and hashes In Game of Thrones, when any of the houses send ravens to each other or pass scrolls between people, they use the house sigils or signet rings to seal them. Doing so assures that the message came directly from them, and no other house. […]

Explaining encryption with Game of Thrones, Pt. 2

In the last article I touched on how symmetric encryption worked. Today we’ll look at asymmetric encryption. Asymmetric encryption, also sometimes called public key encryption is different from symmetric encryption as it uses two “keys” to do the heavy lifting. These “keys” are just two really big random numbers that have been paired together but […]

Explaining encryption with Game of Thrones

You’ve all heard or seen the words asymmetric and symmetric when used to refer to encryption methods. You’ve probably also seen or heard the term RSA encryption used as well. In the next few articles I’ll break down what all this means and how it affects daily life. Lets start with the basics. In ancient […]