Category: Banking + Cyber

21 Nov 2022 Cyber 👁 57 views

Mac Terminal: Scan TLS Certificates with NMAP and SSLScan

The below script will give you basic information on a websites certificate: NMAP is provides a simple way to get a list of available ciphers from a host website / server. Additionally, nmap provides a strength rating of strong, weak, or unknown for each available cipher. First, download the ssl-enum-ciphers.nse nmap script (explanation here). Then from the same […]

Read more →
19 Nov 2022 Cyber 👁 57 views

Scan SSL/TLS Ciphers With nmap and sslscan on macOS

To retrieve a list of the SSL/TLS cipher suites a particular website offers you can either use sslscan or nmap alternatively you can just use nmap (note: i use “-e en0” to bypass zscaler): Another variant (including cert dates, again “-e en0” is used to bypass zscaler):

Read more →
20 Oct 2022 Cyber 👁 26 views

SCP Files to EC2: Mac & Linux Command Guide

I always forget the syntax of SCP and so this is a short article with a simple example of how to SCP a file from your laptop to your EC2 instance and how to copy it back from EC2 to your laptop: Copying from Laptop to EC2 scp -i identity_file.pem source_file.extention username@public_ipv4_dns:/remote_path scp: Secure copy protocol-i: Identity […]

Read more →
25 Aug 2022 Cyber 👁 31 views

Fix SSH WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED

If the fingerprint of your remote host changes you will see the following error message appear: There are many ways to fix this. The easiest of which is simply to delete your “known_hosts” file. This will mean you just need to accept new finger prints on all your SSH hosts. Yes, this is very lazy…

Read more →
12 May 2021 Corporate Culture 👁 48 views

Why Least Privilege Security Is a Lie: 3 Root Causes

In technology, there is a tendency to solve a problem badly by using gross simplification, then come up with a catchy one liner and then broadcast this as doctrine or a principle. Nothing ticks more boxes in this regard, than the principle of least privileges. The ensuing enterprise scale deadlocks created by a crippling implementation […]

Read more →
25 Feb 2021 Cyber 👁 36 views

SYN Flood Testing with hping3: A Practical Guide

Getting an application knocked out with a simple SYN flood is both embarrassing and avoidable. Its also very easy to create a SYN flood and so its something you should design against. Below is the hping3 command line that I use to test my services against SYN floods. I have used quite a few mods, […]

Read more →
18 Oct 2016 Cyber 👁 21 views

The DAO Ethereum Recursion Bug: How the Hack Worked

If you found my article, I would consider it a reasonable assumption that you already understand the importance of this

Read more →
134