search
top
Currently Browsing: portfolio

Review of SANS FOR 508 & Winning the CTF Coin

So, just before the end of a remarkably interesting and odd 2020 year. I decided to go ahead and take the FOR 508 class on Advanced Incident Response, Threat Hunting, and Digital Forensics. I felt this was a course that could really benefit security practitioners for understanding best practices & methods related to IR. As well as, learning new techniques for threat hunting in a large enterprise environment. I decided to put up a post listing our what you can plan to learn from this course should you decide to take it.

Winning the Coin

One of the coolest parts of the class is Day 6 (more details listed later). You get a chance to join into teams and compete in a class APT Threat group challenge. The team that wins the CTF gets an award in the sign of a special course specific SANS Coin. On top of that, SANS will add your name to the Community DFIR Coin holders list! It is a great achievement, and I have to say the challenge was very realistic and fun to tackle.

Read More Of This Post

Finding a Drupal Vulnerability

Finding a Drupal Vulnerability

So, I found my first official Drupal Vulnerability with Drupal Core. You can read more about it officially on Drupal’s website here –> https://www.drupal.org/SA-CORE-2016-001

For those that don’t know much about Drupal it is a Content Management System similar to WordPress and Joomla.

During my time conducting a security assessment and audit on Drupal, I found an issue. This particular vulnerability was found many months back. I had decided to hold off on publishing anything about it so it would give many Drupal users time to mitigate the issue.

What is the Vulnerability?

(more…)

Passing the CISA exam

Passing the CISA exam – Certified Information Systems Auditor

So I though it would be interesting to post up a blog post about my experience challenging the the CISA exam last year in 2016.

I had started this blog a bit afterwards, and never really thought about posting my experience. But, many others have always asked about my experience taking the CISA exam ,and if there were any tips I could give them to better their chances of passing the exam.  My hope is this post helps those that end up reading this and gives them a better insight on the adventure of obtaining the ISACA CISA certificate.

Preparing for the CISA exam

(more…)

Hardening Mobile Phone Devices – iOS/Android

Mobile Hardening

A question I often get asked by a lot of mobile users is regarding how they can secure “harden” their mobile devices. What can they do to add some layers of protection to secure their mobile devices?

There aren’t a whole lot of software tools that are out there which actually harden mobile devices. And, it’s a bit unfortunate that mobile security has a lower priority these days.

Kaspersky Threats 2015

Kaspersky Threats 2015

Courtesy of (https://www.kaspersky.com)

For most Android and iOS devices there are a few steps and actions that you can take in order to harden your mobile device.

The following steps should give you some basic hardening techniques for personal use.
(more…)

Research Project – Android Mobile Forensics

Mobile Devices

Today is more of a Throwback Thursday moment that I’d like to share with everyone regarding mobile devices.

So in 2015 in order to Graduate from the B.tech Forensics – Computer Crime program.
We had a year long research project that was conducted by each student.

My focus was on Mobile forensics and particularly on Android devices.

This was a field that was slightly newer to me, but I felt mobile security will play a huge role in the future. We use our mobile devices for just about everything, and this means future cyber attacks will start to hit mobile devices.

Also, at the same time, I was very curious as to what type of information mobile devices hold and contain about us. I hope my research brings out some answers for many people while at the same time posing further questions to explore.

I’ve decided to attach a PDF of my Android Forensics project.
(more…)

« Previous Entries

top