Advnaced metasploit training with @georgiaweidman
Category Archives: Latest Posts
The latest posts form the RGS Specialists Blog.
Rubber Ducky – Duck Sauce v.01
Welcome to duck_sauce v.01 beta. My goal is to build a Kautilya like functionality for the USB rubber ducky AND to build a Teensy -to- DUCKY translator so you can easilly convert from teensy to duck language. The first step to doing so is to get everything in one spot. Before I go over what […]
Security in hot demand
According to this article http://www.wallstreetandtech.com/data-security/240001898?cid=nl_wallstreettech_daily&elq=0a926fb310f344e3a8b9e816ad2345c4 it looks like security positions are in and will be in hot demand for the near future. This is great news for those of us in the field or just breaking into it.
Hak5 Toys
Hello all I have been a very busy bee over the last few weeks; I recieved my Hak5 toys about the same time PwnPlug updated their release. Sorry Hak5 but since I owned the Pwnplug first I out the toys away and started my upgrade/configuration of the plug. Now that I finished that up I […]
Insecure Magazine Article
Was reading Insecure Magazine issue #34 http://www.net-security.org/insecuremag.php and particularly found one article interesting article that stood out “Firness as a security model”. Although I don’t agree with the fitness aspect of the model (I think it should have been professional sports, which fitness is a key piece), I think it is a good model for explaining how […]
PwnPlug Installation Notes
I just finsihed my installation of the community edition of pwnplug developed by the guys over at pwnieexpress (www..pwnieexpress.com). The installation documentation was a good help; however I did hit a few snags along the way. To make easier for the “next guy” I wrote up some notes during the installation and what to do after the […]
BackBox
Today we offer the BackBox Mind Map – a graphical represnetation of all the tools that make up the distro. This along with the other Mind Maps we are building, will be part of our “all inclusive” Vulnerability Assessments/ Penetration Testing Mind Map we are building – the ultimate Mind Map that everyone from beginners to experts, […]
Who to Blame
Recently my friend the “Rabbott” sent me an interesting link (http://www.tinyurl.com/uapwc) about a recent disclosure effecting the local company Under Armor (UA). The gist of the exposure – an unecrypted thumbdrive was lost. So in a situation like this who do you blame? Case for blaming PWC: 1. They lost the thumb drive (that is what it […]
Podcast Reflection
Welcome to the first post in our “Post a Day in May” campaign where we will either release a new post, tweet or podcast everyday this month. To start it off, I wanted to take a second and reflect on starting up a podcast. It has been an amazing journey but yet we still have […]
@securemaryland
Come follow us on twitter. Join us in the “post a day in May” where we will have a tweet or blog post every day for the entire month of May. Yes that means more typing for us but more importantly it means more information for the community.