Tim SmithSolarWinds and Defense-in-DepthSupply chain attacks demonstrate the need for multiple controlsDec 17, 2020Dec 17, 2020
Tim SmithAdvent of Cyber 2 — Days 1 & 2Get in the spirit of the holidays with some hacking!Dec 3, 2020Dec 3, 2020
Tim SmithThe Necessity of DocumentationWant to be more efficient? Spend time on Good Documentation.Nov 25, 2020Nov 25, 2020
Tim SmithTrouble Alert — Traffic Analysis Exerciseor, How to See Malware Activity in Real Time.Nov 19, 2020Nov 19, 2020
Tim SmithTricks for Simple SubnettingHow to Subnet with only a little bit of memorization and math — no binary requiredNov 12, 2020Nov 12, 2020
Tim SmithIterating a Python Cipher from ScratchGetting started in scripting doesn’t have to be scaryNov 5, 2020Nov 5, 2020
Tim SmithPenTest: Phase 2 — Crafting an ExploitOnce you know the environment, it’s time to break inOct 22, 2020Oct 22, 2020
Tim SmithInfo Gathering with MetaSploitHow much info can you get with a single tool? A lot, actually.Oct 15, 2020Oct 15, 2020