First of all this is not a Blog, it may look like one but this is in fact the first blog post. This is an amalgamation of things that I found poorly documented or that I wanted to make a note of. Its posted publicly so that other people can access it and get help when they cant figure it out themselves. The articles I post are mostly unique and to my best understanding of the topic. I try and keep articles as brief and to the point as possible.
However I will branching into a new sub categoric type of postings from time to time loosely based around NetSec. These posts will be longer and less to the point than the Server Fixes or Workstation Fixes that I do as I am doing less of that in my employment now. I feel that Network Security starts with
A) Having free time (Something I have more of now after relocating)
B) Seeing something and asking if it can be broken (Something IT people ask on a daily basis)
C) Having the underlying hardware and knoledge in order to take on tasks on a efficient and proper manner – This is a biggie, there are time I would like to write about something but have not due to the fact I don’t want to mislead people or provide inaccurate information. I may be able to build it , see it work , and pull it off but at the same time to do a write up on something that I am not confident on does not feel right. This is why I did not write about my hodge podge setup for ESX that I have redone countless times until it became a well oiled machine.
NetSec has interested me for a while now and I have been getting into it more and more in recent. I feel its a constantly evolving field where you play a giant game of chess in order to out think and be more creative than the target is truely interesting to me. Once the idea is laid out, research into the tools and methods required is done, internal testing of exploits has been completed I find myself looking for ways to automate these tasks for larger scale.
The new posts (not all of them Ill still show you how to deal with Citrix XenApp Logon Times next week) will be related to Network Security, most of the information will be censored in order to protect the identities of the internal testing url’s but I will be doing more documentation on the exploits. I will also be covering some popular tools that I’m sure have been documented on thousands of websites but these will be for my own reference only.
For now, courage.