❌

Reading view

Rotating Your Passwords After a Password Manager Breach

| Ethan Robish It’s been nearly a year since Lastpass was breached and users’ encrypted vaults were stolen.Β  I had already migrated to a different password manager for all my […]

The post Rotating Your Passwords After a Password Manager Breach appeared first on Black Hills Information Security, Inc..

  •  

How to Hack WebSockets and Socket.io

Ethan Robish // WebSockets Overview WebSockets is a technology to allow browsers and servers to establish a single TCP connection and then asynchronously communicate in either direction. This is great […]

The post How to Hack WebSockets and Socket.io appeared first on Black Hills Information Security, Inc..

  •  

Home Network Design – Part 1

Ethan Robish // In this series of posts, I’ll discuss how I segmented my home network using VLANs and how I moved away from using a risky consumer-grade router at […]

The post Home Network Design – Part 1 appeared first on Black Hills Information Security, Inc..

  •  

Bugging Microsoft Files: Part 3 – Clearing Metadata

Ethan Robish // In my last twoΒ postsΒ I showed how to insert tracking bugs in both .docx (Part 1) and .xlsx files (Part 2). Β But don’t let all that effort go […]

The post Bugging Microsoft Files: Part 3 – Clearing Metadata appeared first on Black Hills Information Security, Inc..

  •  

Bugging Microsoft Files: Part 2 – Xlsx Files using Microsoft Excel

Ethan Robish // As promised in my previous post, part 1, this post shows how to place a tracking bug in a native .xlsx file. Β Full credit for this method […]

The post Bugging Microsoft Files: Part 2 – Xlsx Files using Microsoft Excel appeared first on Black Hills Information Security, Inc..

  •  

Bugging Microsoft Files: Part 1 – Docx Files using Microsoft Word

Ethan Robish // If you’re familiar with ADHD and Web Word Bugs, you likely already know the method to create web tracking software using .html files renamed as .doc files. […]

The post Bugging Microsoft Files: Part 1 – Docx Files using Microsoft Word appeared first on Black Hills Information Security, Inc..

  •  

How Does Let’s Encrypt Gain Your Browser’s Trust?

Ethan Robish // Let’s EncryptΒ is a free service that allows you to obtain a free (as in beer) SSL/TLS domain validation certificate to use as you wish. Β Here is what […]

The post How Does Let’s Encrypt Gain Your Browser’s Trust? appeared first on Black Hills Information Security, Inc..

  •  

How to Block Ads on All Your Devices

Ethan Robish // Ads serve an important function on the internet. Β For many websites, ads are the main form of revenue that funds the site’s content or service. Β This, however, […]

The post How to Block Ads on All Your Devices appeared first on Black Hills Information Security, Inc..

  •  

SSH Config Files

Ethan Robish // Here’s a short intro for anyone not familiar with ssh config files, which are usually located at ~/.ssh/config As an example, you have ssh running on port […]

The post SSH Config Files appeared first on Black Hills Information Security, Inc..

  •  

Get to Know a Tester: Ethan Robish

Sierra WardΒ & Ethan Robish // Intro by Ethan: Sierra came up with the idea to interview me for thisΒ blog. Β I thought it was a great idea and after watching Rick […]

The post Get to Know a Tester: Ethan Robish appeared first on Black Hills Information Security, Inc..

  •  
❌