Monday, 18th November 2024.

Posted on Monday, 26th March 2012 by Michael

CCDC the First Hour Despite some popular beliefs the Blue Cell are not provide machines that already been back doored for the Red Cell to use. The machines that you are giving are definitely built in an insecure method but that’s it. Your object coming into this event is usually the same year after year. […]

Posted in CCDC | Comments (0)

Posted on Wednesday, 21st March 2012 by Michael

Quick Tips for Linux Security at the CCDC This guide is to be high level and provide a reference for the CCDC Blue Cell to use to help secure their Linux boxes during the CCDC events. This being said this document does not guarantee your victory. My understanding is during the contest tools can be […]

Posted in CCDC | Comments (0)

Posted on Tuesday, 20th March 2012 by Michael

Mid Atlantic CCDC Barcode Scanner Hack: How many of you would of even thought that the scanner on the med station was actually hackable itself?  Before Brad and I went around hacking them with a simple piece of paper that left them unusable until reprogrammed with another sheet of paper that I gave to the […]

Posted in Blog | Comments (2)

Posted on Tuesday, 20th March 2012 by Michael

How to create nodes in a Checkpoint firewall from a CSV Have you ever needed to create 100’s if not thousands of new firewall nodes or networks in your Checkpoint firewall? If so you know how tedious of a task this is and you may have even researched means to do this faster. Research shows […]

Posted in Code | Comments (3)

Posted on Thursday, 15th March 2012 by Michael

Last February I had to study and re-certify for my SANS GCIH certification. The first time I took this test had been 4 years earlier after attending a SANS boot camp held in Las Vegas. My instructor at the time was Ed Skoudis. I got to say if you ever have the opportunity to take […]

Posted in Papers | Comments (4)

About Consulting Store