Presented with a task, if given a loose set of guidance, I’m going to follow my own path. It’s not always the case and I’m sure a lot of folks may not have that flexibility.

This is the reason I chose to write in Golang. Let’s put my self reflection in being able to “quickly” put something together using a language I’ve never touched while leveraging my so called programming degree and my ability to understand how to legitimately interact with systems.

So what should a malicious binary do?

That’s really up to the writer’s choice. When I think of interaction with an operating system, what is considered normal or should be normal enough to blend in with everything else. After all, alerting on behavior is what should be happening but if you are performing seemingly benign behavior, that should fly under the radar. …

This is a companion post to list all the links and some further information that I found to be helpful.

The main focus of the talk was to go over briefly some rtl-sdr basics. Then move into using gqrx to locate FLEX and POCSAG signals. Once located, discuss the method I found useful to decoding these signals. In the interest of keeping the talk down to about an hour with slides and demos, I’ve included links here.

When I think of how information is normally presented, it’s in a condensed format to get a reader or student from where they are at the time to a certain level of understanding with a means to demonstrate their learning. What is missing? The hours of reading and testing that occurs to gather the information. With these links, I’m aiming to provide an opportunity to those looking to read what I’ve read. …

Coming from the Windows side of the house in networking, putting together a physical network with some logical design wasn’t that difficult. With the release of Ghidra, I wanted to get some time with it by doing some challenges from Root-Me and HTB.

It might be easy to distrust the NSA tool and go completely airgapped. In fact I might recommend it for most untrustworthy software. Although it seems quite a few people with more knowledge than I have, have used the tool.

This post isn’t about Ghidra, it’s about the setting up the networking side of the house within VirtualBox to create a span port for Snort and setting up a Squid proxy to create the virtual networking that I would want to put in place for something that is essentially: trust but verify. …

As an internal tester of pens, I’m always on the lookout for things I should not be able to see/find/access. Obviously this pertains to items in scope for an engagement. If you don’t have permission, i.e. written explicit permission to perform penetration testing on those systems, don’t fricken damn do it.

Long ago I went to training for Websphere MQ administration. The reality was I wasn’t doing more than checking channel message levels after updates in that role back then for Websphere. …

Similar to my story about the SanDisk Connect device, this idea started it’s roots in my trip to DefCon 2018, specifically my experience in the Wireless CTF. I wanted to recreate some of the RF signals I was able to “hear” using my gear. I could hear quite a bit but had no idea what to do with it. There were quite a few people running the CTF, they were all over the room. The issue was my pride not simply wanting to reach out and admit what I am: a pleb.

So when coming back to my desk at home, I took my notes and started to research methods to transmit the similar items that I had heard and what was covered on the debrief. My HackRF was still on the way from Amazon but I was eager to get to work. I believe I initially started researching Raspberry Pirate Radio as found here. This seemed a little more than I was going to start with since I really hadn’t played with any of the Raspberry Pi models at that point. In a flurry of googling and reading, I landed on this article, also by Makezine. …

This summer (2018), I was finally able to get to the desert for hacker summer camp. It was the first large scale security conference I was able to attend. Before that, Secure360, BrrCon and BSidesMSP were my only experiences in the infosec conference scene.

While I had a number of talks I wanted to attend, I really wanted to get into the wireless CTF. The ability to sit in a massively contentious RF environment was too much to ignore. I gladly showed up for 2 days of listening via my alfa and sdr dongles.

The wireless CTF experience is a topic of another time, this is about a device I learned about during the debrief. …


Gabe Thompson


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store