RITSEC 2019 happened this past weekend (11/17/2019) and a friend and I decided to have a go at it. The following is a writeup of most of the solutions we came up with except a few I didn’t document 🙁 PWN This was our weakest category with only one solve.…
Leave a CommentAbraxas.io Posts
Introducing Neith
A project I’ve worked on for the past month is now online – Introducing Project Neith! About a year ago I while surfing the web, I came across a tool called ‘PowerShell UniversalDashboard’ made by Adam Driscoll. (https://github.com/adamdriscoll) It makes creating webapps with PowerShell not only possible, but very easy.…
Leave a CommentBook and Review List – 2019
I wanted to add a bit of a personal flair to the site. One of my hobbies is reading and listening to audiobooks so I figured I’d throw down mini-reviews of each book I read throughout the year and leave them here. This is mostly an exercise for me to…
1 CommentBook and review list – 2018
I wanted to add a bit of a personal flair to the site. One of my hobbies is reading and listening to audiobooks so I figured I’d throw down mini-reviews of each book I read throughout the year and leave them here. This is mostly an exercise for me to…
1 CommentLayerOne 2018 CTF – Forensics Challenges
LayerOne is an information security conference in LA which hosts one of the more enjoyable CTFs that I’ve participated in. This is the third in a series of a few post I am writing which goes over the solution of some of the CTF challenges. This post covers some forensics…
Leave a CommentLayerOne 2018 CTF – Web Category
LayerOne is an information security conference in LA which hosts one of the more enjoyable CTFs that I’ve participated in. This is the third in a series of a few post I am writing which goes over the solution of some of the CTF challenges. This post covers Web challenges.…
Leave a CommentLayerOne 2018 CTF – Cyber Kill Chain Category
LayerOne is an information security conference in LA which hosts one of the more enjoyable CTFs that I participate in. This is the second in a series of a few post I am writing which goes over the solution of some of the CTF challenges. These challenge emphasize the importance…
Leave a CommentLayerOne 2018 CTF – Blockchain Challenge Category
LayerOne is an information security conference in LA which hosts one of the more enjoyable CTFs that I participate in. This is the first in a series of a few post I am writing which goes over the solution of some of the CTF challenges. The Challenges This first write-up…
Leave a CommentPhish Yourself! – A practical guide to running an internal phishing campaign.
Social engineering, in particular through the medium of email, is very likely the greatest threat to an average organization. While 0-days do come around and pose real threats to organizations and many of them do not implement strong patch management programs, phishing is simply easier and more effective for the…
1 CommentRecon Part 4 – theHarvester and Recon-ng
TheHarvester I’m going to present this tool in two ways to show simultaneously how cool this utility is and the slightly less impressive way it is actually done: What appears to happen: Type in a username, receive a list of sites that user exists as a member. Type in a…
Leave a Comment