BLOG
In our line of work you stumble on some very cool stuff. Welcome to our logbook.

Using Kibana and Packetbeat to map DNS queries

Overview:  In this short post we’re going to show one visual method of mapping, and potentially identifying malicious DNS traffic within a network. We’re not going to walk through the configuration of Elastic, beats agents or Kibana and there is an assumption that UDP...

read more

Lin.security – walkthrough

Lin.security was released a little over a month ago so as promised we have now published this detailed walkthrough. As such, this article does include spoilers! The idea of the challenge was to find and practise getting root on the host using many different methods -...

read more

A cr4cking g00d time – walkthrough

Warning: This post contains spoilers! It's been a few weeks since we released A cr4cking g00d time and we'd first like to thank everyone who gave it a go. We've received great feedback and are very pleased to hear that people have attained new levels of password...

read more

in.security has landed!

It's official, we're live! As this is our first post under the guise of in.security let's make some introductions. Both Will (@stealthsploit) and I (@rebootuser) have been working in IT and information security over the past decade or so and have been in a number of...

read more