Author Archives: Jason Lewis
SSD, The Future is Now!
Computers these days have lots of memory, fast CPUs and big hard drives. In almost every way, they are better than computers from five years ago. The problem is that when you use them, they feel like the same old … Continue reading
5 reasons to take that government cyber security job
Mike Subelsky had a great list of reasons you might not want to take a government cybersecurity job, I followed up with a few additions. It got me thinking that it wasn’t all bad, there are actually reasons that someone … Continue reading
Todo.txt, a command line todo list
Todo.txt is a shell based todo list manager. It reads and writes to text files, which makes it portable and easy to edit with other tools. I run a copy on my Mac, but you can run it anywhere you … Continue reading
The government leads in cyber-boring
Mike Subelsky has a great blog post where he writes about why you might not want a government cybersecurity job. I agree with all his points and even have some to add.
The Cybermen are coming!
In a recent AP article, a researcher describes a hypothetical scenario where given $100 million dollars he could build a cyber army in two years. Link here. I found this interesting because the tone of the article suggested that cyber … Continue reading
How to build a covert network with OpenVPN
There are many uses for a covert network, for this hypothetical scenario we are corporate spies and we need to exfiltrate data from our assets inside the target corporations network. I don’t think the concepts here are new, but I … Continue reading
Ubuntu LDAP client How To
This works with Ubuntu 10.04 clients using an OSX Snow Leopard OpenLDAP server. It should work with other variants, but I had such a terrible time finding documentation for ubuntu and osx, that I decided to post this.
EFW NAT Loopback
To allow users on internal interfaces to access the external IP, you need to add a Source NAT rule. This is sometimes referred as NAT Loopback. * Source: Network of your LAN subnet * Destination: GREEN/ORANGE * Service: ANY * … Continue reading
Network Analysis 2.0: Staying Ahead of the Threat Curve with AIRE
INTRODUCTION Automation, innovation, reaction and expansion (AIRE) are the foundation of the next generation of analysis techniques and tools – Network Analysis 2.0. The importance of data network analysis is often overlooked, but it impacts many areas including cyber defense, … Continue reading
Getting an image via tftp at the rommon prompt
* rommon 1 > IP_ADDRESS=192.168.11.11 * rommon 2 > IP_SUBNET_MASK=255.255.255.0 * rommon 3 > DEFAULT_GATEWAY=192.168.11.1 * rommon 4 > TFTP_SERVER=192.168.11.100 * rommon 5 > TFTP_FILE=c2600-io3-mz.122-9.bin * rommon 6 > tftpdnld