More Easily Reconstruct a Transmitted File

NetworkMiner Logo on a blue background

Previously I have posted a tutorial on how data can be easily reconstructed from a packet capture using Wireshark if the site is using an unsecured connection. This method involves manually reconstructing the desired files by looking for the appropriate signature. Manually looking for the desired file within a packet capture is a time intensive…

An Overview of the Cyber Kill Chain

Kill chain was originally a term used by the US Military to formally identify the steps involved to neutralise a target. There are a few different models of the kill chain but one of the original military ones is Find, Fix, Track, Target, Engage and finally Assess. The cyber kill chain is an attempt to…

When two-factor isn’t enough.

There has been a massive push to encourage users to enable two-factor authentication on their accounts. From in-game rewards to membership discounts two-factor has been strongly encouraged by a number of companies to provide greater security to users, but could this lull users into a false sense of security? As two-factor usage has grown more…

Getting Started with Splunk

Splunk Blog Post Header Image

With the growth of technology into every aspect of our lives, the amount of data being reported back has grown with it. The sheer volume of data means that manually sifting through the data is impossible within a reasonable time frame.┬áSplunk is software whose aim is to sort through this data and highlight any interesting…

The Value of Your Personal Data

Data Value Header Image

Butlin’s has stated that it believes up to 34,000 records have been accessed by hackers and the data comprises of names, home addresses, email addresses, and phone numbers, adding that they believe payment details are secure. This breach comes shortly after Dixons Carphone revised the number of people possibly affected in their data breach from…

Creating and uploading a Python project to Github

Having recently attended BSides London 2018 I’ve become more conscious of where my skills fall short and more determined to increase them. An area I’m particularly determined to improve is my programming skills. One of the subjects I did at A-Level was computing where I we were tasked with creating a program in Pascal. Pascal…