I came across a really great way of parsing output from command line tools within PowerShell so had to right a quick blog about it here to share it. Normally I like to cite my sources but I’ve lost track of the original stack overflow post that led me to this point… Sorry! This technique […]
Given a recent dispute over our use of SYN ACK by Synack, we have been force to change our name. Going forward, we will be known as CyberCBK.co.uk – please update your bookmarks! Logos and social pages will follow suit shortly. We lose access to the domain on the 13th August 2018. Thank you all […]
One thing I come across time and time again are poorly configured firewalls. The reason for this is largely down to the people who configure them. Companies often put all their eggs in one basket when it comes to IT services which means people who perhaps aren’t best suited to managing security products, end up […]
Needless to say, the content of this post is my personal opinion, it’s biased, but based on my experiences whilst dealing with Nominet in a recent dispute related to this blog. I felt it necessary to write about my experiences with Nominet. As I have posted about recently, since March 2017 I have been involved […]
Today, I must unfortunately announce the loss of our name SYNACK.co.uk. Since March 2017 I have been involved in a dispute with Synack.com regarding our use of the name “SYN ACK”. We have until 13th August 2018 to change our name. I’m not blind, I can see that Synack and SYN ACK contain the same […]
This post will be ever evolving as I find more tips and tricks for working with Docker on Windows. Why not bookmark it and check back? Misc When spawning interactive linux containers, use bash over sh as it provides a more feature rich shell with tab completion, history and cursor actions. PowerShell commands You can tidy up your […]
In part 1 to this series we installed Docker and got our very first container off the ground. In this post, I want to take this a little further and build a new ubuntu image using a dockerfile. A dockerfile is a file that docker can use to automatically modify an image by running commands, […]
Recently I was doing some hackery for a project and really struggled getting docker off the ground and serving up a website from within a container. This particular project was on linux but actually docker can also run on Windows, using the “built in” functionality of Hyper V. Not one to be defeated I set […]
Nessus Professional (Pro) is undoubtably one of the cyber security consultants favourite tools. It has also been a widely adopted tool for organisations on a budget looking to start out in the never ending world of vulnerability management. It’s humble beginning starting out as a fully open source tool, to the favourably priced commercial entity we see […]
As there’s been a lot of SIEM hype over the last few years, I’d thought I’d go over a few common problems I’ve come across whilst deploying new, and fixing existing SIEM deployments. This won’t be a complete list, but just some of the most common. I may update this post from time to time. […]