Brick Hack 2015
This weekend I went to Brick Hack and I have got to say that it was one of the best organized hackathons I've ever been to. There was plenty of...
AMD R9 290x GPU Passthrough on VMware ESXi
For those of you looking to use there R9 290x with a virtualization software below I'll detail how I got ESXi GPU passthrough to work with my R9 290x. I...
This past weekend I attended McHacks. I just wanted to post my experience and possibly provide some constructive criticism for the organizers of the hackathon. Just some background for those...
My Quadcopter Adventures - Lessons learned from my failures
Back in September I ordered a DIY drone kit from an online Chinese retailer. The particular one I ordered is this one. It took forever to come in and it...
CSAW CTF 2014 - Forensics 300 - Fluffy No More - Writeup
In this challenge you were given the following archive of a servers system files. You then had to forensically determine what happened to the server. The description you were given...
Active Directory Locked Out Users - Powershell script
I just wanted to share with everyone a project I have been working on slowly over the past few months. It's a powershell script that allows you show currently locked...
DEF CON 22 - Day 4
This was the last day DEF CON. I was only able to attend on presentation that didn't include things like closing ceremonies or contest winners. NSA Playset: PCIe This talk...
DEF CON 22 - Day 3
This day was probably the best day for talks in my opinion. I was able to attend a good amount and almost all of them were very informative and entertaining....
DEF CON 22 - Day 2
I attended a good amount of talks on this day but this was the only ones that I actually understood. I did also attend-Extreme Privilege Escalation On Windows 8/UEFI System...
DEF CON 22 - Day 1
DEF CON is a completely different environment compared the Black Hat. DEF CON is mainly geared to the personal hacker. While Black Hat is meant for security professionals in large...