1. Search Techniques

    Google Dorking is a powerful technique used to silently obtain information on various targets to assist in both research and furthering attack. Some of my favorite operators include: …


  2. Exporting Private Keys - OSX

    In this post I’m going to explain how to successfully export private/public key pairs from OS X Keychain to a new computer. As your aware, under normal export procedures, the private key isn’t exported — just the public. This is true for certificates, specifically S/MIME. …


  3. Automated Malware Analysis - Part 3

    After preparing most of our configurations for the OSX system in Part 2 of the multi-part post on “Automated Malware Analyis” we are finally ready to install our Cuckoo instance. This can be accomplished on either the existing host device (OSX) or in a virtual machine. For my setup, I have a cuckoo instance running on my host machine along with the required software, the commands below is how I achieved this. …


  4. Hacker Documentaries

    Being in the cyber security industry I can’t help myself from watching how the media industry dipicts us. Some of the content is great and on point, while other is just pure entertainment. For what it’s worth, below are my favorite “Hacker” Documentaries that I recommend everyone watch. This is especially true if your at all curious. …


  5. Automated Malware Analysis - Part 2

    If you have been following along from Part 1, we discussed a general overview of what we are going to accomplish. Here in Part 2 we will discuss how to setup host machine which is a Mac OSX device. …