This year I felt like doing something a bit outside my comfort zone for Christmas. My local hacker brethern traditionally get together for a holiday hack-day, sip some 'holiday cheer' and recap epic stories of…

Right as the world gets a grasp of the WannaCry ransomware, which attacked Microsoft Windows SMB services; a new exploit is rearing its ugly head. "Hey, 2008 called and wanted it's SMB vulns back." Deemed…

As is common with most penetration tests, my initial footholds typically come from public facing authentication portals such as Webmail and VPNs. Most of these portals are tied to the organization's Active Directory and subject…

A phishing campaign seems to be making its way around the internet baiting users to open a 'Google Document' sent by someone they had contact with in the past. The link appears to redirect to…

Along with a career change, I give up involvement with the Shellntel blog that my former team worked so hard to create. This blog will help serve as a way to share my future posts,…

With the demands of a mobile workforce, wireless networks in enterprise environments are quite common. Typically, enterprise wireless networks employ WPA-Enterprise security features, which removes the need for preshared keys (WPA2-PSK) that float around between…

Travis uses PGP to send things securely. His public key can be found below: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.14 (GNU/Linux) mQINBFIFDR4BEAC6wOUZRckAK9SMJ9cXWw0fNRw+nAjkiHuooGpVMT7/xJl37dtD 5gvvW3JpUYtzA+PSbdCJRsACBwnr2eCcG9+oUc4TR5Kkc+xuIt4x6Qr1s+Y52KyD pWT9BNVe9/…