Getting Started with Splunk

Splunk Blog Post Header Image

With the growth of technology into every aspect of our lives, the amount of data being reported back has grown with it. The sheer volume of data means that manually sifting through the data is impossible within a reasonable time frame. Splunk is software whose aim is to sort through this data and highlight any interesting…

The Value of Your Personal Data

Data Value Header Image

Butlin’s has stated that it believes up to 34,000 records have been accessed by hackers and the data comprises of names, home addresses, email addresses, and phone numbers, adding that they believe payment details are secure. This breach comes shortly after Dixons Carphone revised the number of people possibly affected in their data breach from…

Creating and uploading a Python project to Github

Having recently attended BSides London 2018 I’ve become more conscious of where my skills fall short and more determined to increase them. An area I’m particularly determined to improve is my programming skills. One of the subjects I did at A-Level was computing where I we were tasked with creating a program in Pascal. Pascal…

Hack the Box – Bashed User Own

Bashed Header Image

For quite sometime now I’ve been wanting to publish the write-up to my first successful hack on Hack the Box but as part of their terms of service you aren’t allowed to publish your write-up until that machine has been retired. Now that the Bashed machine has been retired I finally can. If you haven’t already I’d…

The CCleaner Supply Chain Attack

Third Party Software Header Image

This week Avast disclosed exactly how its CCleaner software was compromised in September last year. Avast found that the attackers logged into a TeamViewer remote desktop account on a Piriform developers computer (Piriform being the company that created CCleaner that was acquired by Avast shortly before the disclosure). With access to the remote desktop account the…

Cracking WEP Encryption

WEP Decryption Header

Recently I was tasked with cracking the WEP Encryption of a sample capture generated using Wireshark. With a sample capture provided this didn’t take long and thought I’d do a quick tutorial on how I did it. NOTE: A warning is usually appended to any article concerning the capture of packets on a network and…