As anyone who's spent any time debugging ELK, or more accurately logstash will tell you, it's a slow process. Everyone instantly leaps to share Grok Constructor or Grok Debugger, which are both super useful, but not always the point. There's a lot more to debugging logstash than …
So a tweet by Dr. Jessica Barker about imposter syndrom in infosec got me replying about how I've had imposter syndrome a bunch. Perhaps no more and no less than anyone else, we'll see, but I said I'd write it up as the tweets was not ideal for it. (Sadly …
(This is a bit ragey. I'm not gonna link to anything/anyone, and I wasn't even there, but this attracted my ire)
Tired of people hating on @Docker/a> giving out @yubico/a> Yubikeys at their conf. Yes it's trusting USB devices at a conference, which us jaded security types …
Click to play, it's a way of forcing plugins in your web browser in to gaining consent from you in to running. Why is this important? Well, malicious web pages can do a lot with them. Adobe Flash Player, the main one I'm about to talk about …
A common way of getting tools on to a machine, or exfilling data is to encode it in some way and paste it in or out, something like xxd or base64. So you don't have to open up yet another channel, in or out. A wget outbound or scp in …