InGuardians Labs

Attacking and Defending Kubernetes: Bust-A-Kube – Episode 1
Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille...

12 Things I Learned the Hard Way about being a Project Manager in InfoSec
Over the past eleven and a half years, I have been blessed (or some say cursed) with the opportunity to work in the Information Security industry. When I first stepped in, I had no idea the different levels of client-facing and internal communication struggles I would...

Sparring Board Version 1.2 – Raspberry Pi Edition
Post Author: Don C. WeberTwitter: @cutawayDate Published: 26 July 2013In May 2013 Jay Radcliffe decided that he wanted InGuardians to do something special for Black Hat USA 2013 and DefCon 21 and thus Sparring Board Version 1.2 - Raspberry Pi Edition (SBv1.2) was...

Protecting the Mr Robot Vuln Hub Machine – Part 2 – Confining WordPress with AppArmor
This blog post, focusing on attack and defense using AppArmor, continues to walk you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We escalate privilege to capture more flags, then use AppArmor to break our attack. This is the sequel to Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response.

Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response
This blog post walks you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We use OSSEC to detect a password spray in progress and automatically break it. In the next in this series, we’ll use escalate privilege to capture more flags, then AppArmor to break our attack.

Make your Tastic Fan-Tastic
Here at InGuardians, we are huge fans of the Tastic HiD card long-range reader. Designed and implemented by Bishop Fox, this long-range RFID reader allows us to silently and stealthily acquire sensitive data from things like employee badges, and has become a huge...

Radio Communication Analysis using RfCat
Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 15 Oct 2013 Many people think RfCat is a very cool concept. The thought of monitoring and interacting with sub-gigahertz radio is very sexy. Hell, it IS sexy. Then people get an IM-ME, a...

The Ultimate Arduino GPS Clock (UAGC) – Part 1
Original Post Author: Tom Liston [Twitter: @tliston] Original Date Published: 11 June 2013 Doing a Google search for "arduino GPS clock" turns up more than a few other projects that use the time information found within the NMEA data provided by a GPS signal to...

Somebody Is Securing Samsung Wireless Network Extenders
Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 03 June 2013 Black Hat USA 2013 will include a presentation by Tom Ritter and Doug DePerry titled: "I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a...
What Was The Name Of That Storm?
Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 25 April 2013 Mike Poor (@Mike_Poor) noticed Stephen Northcutt's blog post about phone spear-phishing. This reminded him of an email that I sent to the Senior Security Analysts here at...