Skip to content

bneg

If you seek peace, prepare for war

  • Home
  • About
  • Contact

Category: Uncategorized

iTerm2 Customizations for Hackers

On January 15, 2018January 15, 2018 By Jeremy JohnsonIn UncategorizedLeave a comment

I use iTerm2 exclusively as my terminal of choice on the Mac platform. In fact it's in the top 10 reasons why it would be incredibly challenging for me to ever leave the Apple platform. I've added a few customized triggers to help me as a penetration tester. These are all regular expressions which iTerm2 …

Continue reading iTerm2 Customizations for Hackers

Purple Team: Your First Pentest Results

On June 19, 2017 By Jeremy JohnsonIn UncategorizedLeave a comment

I wrote another guest post for Critical Informatics on the top 10 recommendations we end up giving new clients. These are common vulnerabilities that are not obvious for non-security focused teams. If you've never had a pentest, check this out before your engagement for some "low hanging fruit" to remediate. 

Linux Backdoors and other evil

On April 28, 2017 By Jeremy JohnsonIn Uncategorized2 Comments

My experience at a certain competition (evading the search engines here) has prompted two individuals in separate contexts to ask me about some of the evil tricks I discovered and played on the competitors. I've been using some form of *NIX since 1996, when it was introduced to me in High School. Since then I've kept …

Continue reading Linux Backdoors and other evil

You are the weapon

On December 22, 2016December 23, 2016 By Jeremy JohnsonIn UncategorizedLeave a comment

"You are the weapon, everything else is just a tool" - Anonymous Today the Wassenaar agreement suggests that the tools we in the cyber security industry use, are munitions. Munitions which should be export controlled, and monitored by governments. The truth is, the most powerful tool in our arsenal is our minds. Great hackers don't …

Continue reading You are the weapon

Search

Social

  • View beyondnegative’s profile on Twitter
  • View jeremy-johnson-b11a7ab5’s profile on LinkedIn
  • View bneg’s profile on GitHub

Popular Posts

  • iTerm2 Customizations for Hackers
  • Automated Empire Infrastructure
  • Empire without PowerShell.exe
  • Purple Team: Your First Pentest Results
  • Purple Team: About Beacons
  • Empire Post Exploitation – Unprivileged Agent to DA Walkthrough
  • Athena: The CIA's RAT vs Empire
  • Rome Didn’t Fall in a Day: Building A Resilient Empire C2, Part Two
  • Dropbox for the Empire
  • Vulnerabilities in Cohu 3960HD

My Twitter Ramblings

My Tweets

Tags

0-Days empire infrastructure reversing vault7

Category Cloud

Blue Team Commentary Pentesting Red Team Uncategorized Vulnerabilities War Story
Create a website or blog at WordPress.com
  • Follow Following
    • bneg
    • Already have a WordPress.com account? Log in now.
    • bneg
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...