Posts by Year

2017

IPTables

7 minute read

This post is created to both introduce and serve as a reference to the Linux firewall IPTables.

Protostar Stack Write-up

16 minute read

This post will be the first part in a series of write-ups for Protostar’s challenges.

DLL Proxying

7 minute read

This post will be the first part in a series on DLL Security covering topics such as DLL Proxying, DLL Injection, and IAT Hooking.

2016

Nmap Commands

less than 1 minute read

This post covers basic Nmap commands for Intelligence Gathering using active and passive techniques.

SQL Injection

10 minute read

In this post we cover the three categories of SQL Injection and detail and provide examples for four types of SQLi attacks.