Adding a Proxy Certificate in Windows Subsystem for Linux

This week I was having an annoying issue trying to use the requests library from Python – my corporate proxy is doing SSL inspection and HTTPS traffic was failing due to SSL errors. After some googling, troubleshooting, and head-smashing – I found a solution. That should be it! From here on you can test withContinue reading “Adding a Proxy Certificate in Windows Subsystem for Linux”

Spies, Lies, and Algorithms: The History and Future of American Intelligence by Amy B Zegart

This was a really great book that helped me understand quite a bit more about the problems faced by the US government intelligence community. The book does a deep dive into the history of the IC and discusses some of the successes and failures that the IC has had throughout history. Backed by nearly 30Continue reading “Spies, Lies, and Algorithms: The History and Future of American Intelligence by Amy B Zegart”

This Is How They Tell Me the World Ends (The Cyberweapons Arms Race) – Nicole Perlroth

The book begins by discussing the origins of Zero Day markets and follows the author’s journey into discovering exactly who is buying and who is selling these bugs and exploits. This is a narrative-driven piece that focuses both on the individuals that Perlroth interviews and intertwines their stories with the historical events of the so-calledContinue reading “This Is How They Tell Me the World Ends (The Cyberweapons Arms Race) – Nicole Perlroth”

HackTheBox – Love

Enumeration: NMAP: Enum4Linux: Nikto: Dirb: Outputted a long text file but the only thing interesting is that there http://love.htb/admin/ was available – this is useful later Getting Foothold: The enumeration stage revealed 2 interesting tidbits: staging.love.htb is a valid subdomain love.htb/admin/ is apparently an admin login port 5000 was open So naturally the first stepContinue reading “HackTheBox – Love”

Remediating OWASP Vulnerabilities

For my Software Security class we were given the task of remediating vulnerabilities in the OWASP Wacko Picko web server. This is an intentionally vulnerable and broken web server with quite a few intentionally bad bits of code. The code for this box can be found here:https://github.com/adamdoupe/WackoPicko Problems Session ID Vulnerability Definitions [https://cwe.mitre.org/data/definitions/384.html] This vulnerabilityContinue reading “Remediating OWASP Vulnerabilities”

TryHackMe – Attactive Directory

This is a write-up I did after working through this CTF: https://tryhackme.com/room/attacktivedirectory Tools: Impacket:Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, asContinue reading “TryHackMe – Attactive Directory”