Open in app

Sign In

Write

Sign In

Tim Smith
Tim Smith

26 Followers

Home

About

Dec 17, 2020

SolarWinds and Defense-in-Depth

Supply chain attacks demonstrate the need for multiple controls If you’ve been paying attention to security news over the last few days, you’ve no doubt heard about the SolarWinds security compromise that has affected several US government agencies, the cybersecurity company FireEye, and possibly thousands of other private companies. …

4 min read

SolarWinds and Defense-in-Depth
SolarWinds and Defense-in-Depth

4 min read


Dec 10, 2020

IAM what I AM

The Fundamentals Identity and Access Management Part of data privacy and protection in an enterprise environment involves Identity and Access Management (often shortened to IAM). Despite the many variations and complexities of IAM systems in corporate setups, the fundamental principle is pretty basic: IAM is about controlling who has who…

Cybersecurity

5 min read

IAM what I AM
IAM what I AM
Cybersecurity

5 min read


Dec 3, 2020

Advent of Cyber 2 — Days 1 & 2

Get in the spirit of the holidays with some hacking! If you’re like me, you probably have a number of projects that you’re working on and tracking at any one time. It’s important to keep your skills fresh, and, if you can have a little fun while you’re at it…

Cybersecurity

8 min read

Advent of Cyber 2 — Days 1 & 2
Advent of Cyber 2 — Days 1 & 2
Cybersecurity

8 min read


Nov 25, 2020

The Necessity of Documentation

Want to be more efficient? Spend time on Good Documentation. Today I want to talk about a topic that is often disparaged within certain departments and industries: documentation. Typically, documentation is seen as a “necessary evil” that wastes time or resources when an employee could be spending that time on…

Cybersecurity

5 min read

The Necessity of Documentation
The Necessity of Documentation
Cybersecurity

5 min read


Nov 19, 2020

Trouble Alert — Traffic Analysis Exercise

or, How to See Malware Activity in Real Time. I recently discovered Brad Duncan’s blog Malware-Traffic-Analysis.net. The blog is host to a variety of traffic analysis exercises, primarily involving malware infections that take place over a network and are documented in pcap files. It has really been scratching my digital…

Pcap Analysis

6 min read

Trouble Alert — Traffic Analysis Exercise
Trouble Alert — Traffic Analysis Exercise
Pcap Analysis

6 min read


Nov 12, 2020

Tricks for Simple Subnetting

How to Subnet with only a little bit of memorization and math — no binary required When I was first learning about networks, the topic that most consistently stumped me was subnetting. I am notoriously bad at doing anything other than simple math in my head, and it always felt…

Subnetting

6 min read

Tricks for Simple Subnetting
Tricks for Simple Subnetting
Subnetting

6 min read


Nov 5, 2020

Iterating a Python Cipher from Scratch

Getting started in scripting doesn’t have to be scary Earlier this week, I was working on a project that required a little bit of python scripting. While not anything too complicated, it reminded me that I needed to stay fresh with my programming, and so, as a personal challenge, I…

Python

10 min read

Iterating a Python Cipher from Scratch
Iterating a Python Cipher from Scratch
Python

10 min read


Oct 29, 2020

Ransom in the Time of Corona

Ransomware is on the rise in 2020 A growing concern for every industry just about everywhere is the topic of ransomware. Ransomware is not a new threat (the first documented case of ransomware occurred in 1989 for a whole $189), but incidents of ransomware have been increasing exponentially lately, especially…

Cybersecurity

5 min read

Ransom in the Time of Corona
Ransom in the Time of Corona
Cybersecurity

5 min read


Oct 22, 2020

PenTest: Phase 2 — Crafting an Exploit

Once you know the environment, it’s time to break in Today we’re going to follow-up last week’s blog post about the information gathering phase of PenTesting with a post about the exploitation phase of a PenTest. As discussed last week, we’re running the VM “SoSimple” from VulnHub. …

Cybersecurity

8 min read

PenTest: Phase 2 — Crafting an Exploit
PenTest: Phase 2 — Crafting an Exploit
Cybersecurity

8 min read


Oct 15, 2020

Information Gathering with MetaSploit

How much info can you get with a single tool? A lot, actually. While working on some individual PenTesting this week, I decided to challenge myself and see how much information gathering I could do with just a single tool — MetaSploit Framework, one of the most popular hacking tools…

Metasploit

9 min read

Info Gathering with MetaSploit
Info Gathering with MetaSploit
Metasploit

9 min read

Tim Smith

Tim Smith

26 Followers

Cybersecurity and Communication. https://www.linkedin.com/in/tsmith6421/

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech