by Tim Medin | May 30, 2019 | Blog Posts
Hal Pomeranz tipped me off to a nasty little trick of using Linux’s own auditing features and PAM to grab clear text passwords from users as they use sudo/su on the command line. Linux PAM (Pluggable Authentication Modules) are a flexible method of implementing...
by Red Siege | May 23, 2019 | Blog Posts
Overstreet is an experienced penetration tester and red team operator and has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare. He also has more than five years of systems...
by Mike Saunders | May 7, 2019 | Blog Posts
tl/dr; There are a lot of ways to get into infosec. I’ll try to outline some of the things that have helped me along the way and provide some resources to help you. We recently had the pleasure of sponsoring BSides Kansas City. Side note: if you haven’t been, you...