InfoSec Stuff.

Please use the links below to navigate the site or return to the main page.

Here are a few training videos I had made for new analysts. Geared towards performing an investigation for suspected inbound phishing activity, these videos gave the new analyst an investigative methodology to perform basic triage, finding common Indicators of Compromise (IOCs) for blocking, all the while keeping themselves and their corporate environment safe.


Introduction to Phishing




Phishing Walkthrough - Basic 1




Phishing Walkthrough - Basic 2




Phishing Walkthrough - Basic 3




Phishing Walkthrough - Basic 4






Here are a few other cyber-security related videos that really do not fit in anywhere else.


Credential Harvesting with Cobalt Strike




Common Malicious Indicators




Attacker Notification with a Single Pixel




Quick Example of Beacon Activity






Some of my Certifications (but not all)

GIAC Cloud Penetration Tester

Offensive Security Certified Perfessional

Offensive Security Wireless Professional





Presentations

These slides are from my presentation on .dll Search Order Hijacking given at a Sony internal training event back in 2017. It does not go into overwhelming detail, just a general overview on the topic. The slides haves been saved here in PDF format.

Slides