Using LUKS

Using LUKS

Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption.  LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment.  LUKS can...
OverTheWire – Narnia 0

OverTheWire – Narnia 0

Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...
Malware Types

Malware Types

Malware Types Malware can be classified by it’s behavior, target platform, or attack commands.  Of the three classifications, we will look more specifically at malware based on behavior.  These can be divided into 8 different categories: I. Infectors II. Network...

SANS GIAC Intrusion Analyst Review (GCIA)

Course Overview I recently completed and was awarded my SANS GCIA Certification.  The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network...