Hardware-Hacking: Arduino R4 and a Microwire EEPROM

Let's explore how we might interface with a Microwire EEPROM and extract data using the newly released Arduino UNO R4 eval board.…

SE: Build a Caller ID Spoofing Rig

Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…

SMBExec: Red Side Analysis (Part 2)

STACKTITAN's Alex Mason is back with part II in this tradecraft series. This time around he demonstrates modifying SMBExec to bypass various detections.…

SMBExec: Red Side Analysis (Part 1)

Ride along as Alex Mason from STACKTITAN shares tradecraft of analyzing offensive toolchains to identify detection opportunities in part one of this blog series.…

LOG4J: Vulnerability Detection and Remediation

Get to the Point This is short and sweet because the info is out there, and we just want to direct people to the collective, without the "jump to the recipe" bloat. We are not going to reiterate what has already been provided numerous times elsewhere on the interwebs. What…