Open in app

Sign In

Write

Sign In

Grimminck
Grimminck

117 Followers

Home

About

Pinned

Running a fake power plant on the internet for a month

People think of the internet as a host for services like banking websites, blogs and social networks. However, this is only a small part of everything connected. The internet is home to a big range of IoT systems and machines as well. …

Honeypot

7 min read

Running a fake power plant on the internet for a month
Running a fake power plant on the internet for a month
Honeypot

7 min read


Jan 26

Digital False Flag Operations: A How-To Guide

Pinning your malicious cyber operations to the opposition — In today’s digital age, the threat of cyber attacks is a constant concern for organizations and individuals alike. One tactic that has gained attention in recent years is the use of false flag operations. …

Cybersecurity

5 min read

Digital False Flag Operations: A How-To Guide
Digital False Flag Operations: A How-To Guide
Cybersecurity

5 min read


May 28, 2022

Building a Threat Intelligence Feed using the Twitter API and a bit of code

The InfoSec community is highly active on Twitter. The platform is, among other things, used is for sharing malware and phishing URLs through the #opendir hashtag. Very useful for correlating with DNS traffic, but not often used due to the difficulty of interpreting Twitter feeds in an automated manner. …

Infosec

3 min read

Building a Threat Intelligence Feed using the Twitter API and a bit of code
Building a Threat Intelligence Feed using the Twitter API and a bit of code
Infosec

3 min read


Nov 15, 2021

Running a WiFi-less Home Network: Security Paranoid Edition

And a few reasons why you should consider it. — When reading the title, you might have asked yourself: Why would anyone get rid of the Wi-Fi capabilities of their network? Aren’t wireless access points something that should improve my internet experience? Here a few reasons why you might consider moving away from using a wireless internet connection in general. …

Infosec

5 min read

Running a WiFi-less Home Network: Security Paranoid Edition
Running a WiFi-less Home Network: Security Paranoid Edition
Infosec

5 min read


May 12, 2021

The implications of neglecting IPv6 on your internet facing services

TL;DR: Managing the online exposure of systems can be difficult. Sometimes IPv6 network configurations get forgotten, leading to services unknowingly connected to the internet. We’ve been (very) slowly adopting IPv6 since its introduction in 1995. This added protocol version allows computer systems to be available in two different address spaces…

Ipv 6

4 min read

The implications of neglecting IPv6 on your internet facing services
The implications of neglecting IPv6 on your internet facing services
Ipv 6

4 min read


Dec 25, 2020

Spoofing JARM signatures. I am the Cobalt Strike server now!

TL;DR: JARM is very useful fingerprinting tool, but can be deceived by replaying server hello’s from other services. The JARM scanner created by @SalesforceEng is quite an effective tool for system fingerprinting. It uses the Server Hello responses from a TLS handshake to generate a signature. These can then be…

Ja 3

3 min read

Spoofing JARM signatures. I am the Cobalt Strike server now!
Spoofing JARM signatures. I am the Cobalt Strike server now!
Ja 3

3 min read

Grimminck

Grimminck

117 Followers
Following
  • @SalesforceEng

    @SalesforceEng

  • Jules Huisman

    Jules Huisman

  • Remco Verhoef

    Remco Verhoef

  • Norman M. Ricklefs

    Norman M. Ricklefs

  • Dick O'Brien

    Dick O'Brien

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech