InGuardians Labs

InGuardians Press Release – InGuardians’ Live Online Training launches with top-ranking ‘Assessing and Exploiting Control System and IIoT’ class taught by Justin Searle

FOR IMMEDIATE RELEASE   “InGuardians’ Live Online Training launches with top-ranking ‘Assessing and Exploiting Control System and IIoT’ class taught by Justin Searle” Seattle, WA - April 27, 2020  For more than 20 years, InGuardians’ core has been top-tier...

read more

The Backup Operators Guide to the Galaxy

Backup Operator accounts are ubiquitous and often overlooked by both blue and red teams. These accounts have abusable permissions and are rarely maintained properly. In this webinar, we will examine and demonstrate novel techniques to stealthily compromise Active...

read more
Software Defined Radio: With Even More Awesome!

Software Defined Radio: With Even More Awesome!

On January 31st we started our series of monthly webinars. In our first webinar, Larry Pesce, our Director of Research talks about how to take a radio and turn it into whatever you want with software, for security or fun or both!   A brief look at...

read more
All Your Copy/Paste Are Belong to Us

All Your Copy/Paste Are Belong to Us

  Author: Adam Crompton, Senior Security Consultant Introduction The clipboard functionality of modern operating systems has been around for decades, implemented to provide the ability to take a bunch of 1’s and 0’s and store them temporarily.  In more common...

read more
Sparring Board Version 1.2 – Raspberry Pi Edition

Sparring Board Version 1.2 – Raspberry Pi Edition

Post Author: Don C. WeberTwitter: @cutawayDate Published: 26 July 2013In May 2013 Jay Radcliffe decided that he wanted InGuardians to do something special for Black Hat USA 2013 and DefCon 21 and thus Sparring Board Version 1.2 - Raspberry Pi Edition (SBv1.2) was...

read more
Protecting the Mr Robot Vuln Hub Machine – Part 2 – Confining WordPress with AppArmor

Protecting the Mr Robot Vuln Hub Machine – Part 2 – Confining WordPress with AppArmor

This blog post, focusing on attack and defense using AppArmor, continues to walk you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We escalate privilege to capture more flags, then use AppArmor to break our attack. This is the sequel to Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response.

read more
Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response

Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response

This blog post walks you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We use OSSEC to detect a password spray in progress and automatically break it. In the next in this series, we’ll use escalate privilege to capture more flags, then AppArmor to break our attack.

read more

Categories