Giving a Talk at BSides London 2019

For this years BSides in London I applied to be able to give a talk as part of the rookie track. I was accepted onto the rookie track with my talk Using Network Miner To Reconstruct Network Traffic; parts of which I previously explained in one of my blog posts. The experience certainly involved a…

More Easily Reconstruct a Transmitted File

NetworkMiner Logo on a blue background

Previously I have posted a tutorial on how data can be easily reconstructed from a packet capture using Wireshark if the site is using an unsecured connection. This method involves manually reconstructing the desired files by looking for the appropriate signature. Manually looking for the desired file within a packet capture is a time intensive…

An Overview of the Cyber Kill Chain

Kill chain was originally a term used by the US Military to formally identify the steps involved to neutralise a target. There are a few different models of the kill chain but one of the original military ones is Find, Fix, Track, Target, Engage and finally Assess. The cyber kill chain is an attempt to…

When two-factor isn’t enough.

There has been a massive push to encourage users to enable two-factor authentication on their accounts. From in-game rewards to membership discounts two-factor has been strongly encouraged by a number of companies to provide greater security to users, but could this lull users into a false sense of security? As two-factor usage has grown more…

Getting Started with Splunk

Splunk Blog Post Header Image

With the growth of technology into every aspect of our lives, the amount of data being reported back has grown with it. The sheer volume of data means that manually sifting through the data is impossible within a reasonable time frame.┬áSplunk is software whose aim is to sort through this data and highlight any interesting…

The Value of Your Personal Data

Data Value Header Image

Butlin’s has stated that it believes up to 34,000 records have been accessed by hackers and the data comprises of names, home addresses, email addresses, and phone numbers, adding that they believe payment details are secure. This breach comes shortly after Dixons Carphone revised the number of people possibly affected in their data breach from…