I am pretty sure that most of you came here because of the word "Brute force", which needless to say will be covered in this article, but it is just a minor change in concept which I will be explaining here. So SSH, a protocol that most of us use in one form or the... Continue Reading →
Automating #HASH check using python
We all know that the pace at which technology is advancing, automation has become crucial in our daily lives. Specially in the field of security where attackers are becoming heavily automated, its best for organizations to move to a more automated mindset when defending against them. Trying to defend against these attacks manually, more or... Continue Reading →
SSH login using keys through PuTTY
This might be a a little out there on the internet but even today a lot of us are not aware of the smallest measures one can implement to secure themselves from the various red team attacks. Sometimes its the smallest of things that we overlook end up getting us compromised. The whole idea of... Continue Reading →
Automating Inventory of Authorized and Unauthorized Software
With this article I intend to help you all to understand not only the importance of the CIS Critical Security Control: Inventory of authorized and unauthorized software, but also the importance of automation. Trust me, automation makes the job easy. But, to do so I want to share my own experience and how I ended... Continue Reading →
Setting up Cuckoo 2.0.5 – Part II
This is my second article on the cuckoo sandbox series. The previous one focused on setting up the host machine and from here on out we will be focusing on the guest machine. Preparing the Virtual Machine Now that we are done with the host machine, we will start preparing the virtual machine, starting with... Continue Reading →
Setting up Cuckoo 2.0.5 – Part I
This is a comprehensive, step by step documentation of the procedure that I followed for installing the latest version of cuckoo, i.e. 2.0.5. This was part of a bigger project I was working on during my master's education. Your feedback on how to improve or any corrections related to my cuckoo setup would be greatly... Continue Reading →
Hell0 W0rld
Welcome to SecureSeed. I will be posting out articles on the things I learn in the cyberspace and in return help you learn as well. Not necessarily security articles all the time, but other experiences, scripts, tools I come across will also be posted here. What this blog is "not" about: OR Maybe... Continue Reading →