<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8360026754900740261</id><updated>2026-04-11T15:18:22.671-07:00</updated><category term="Hacking"/><category term="book review"/><category term="Infosec"/><category term="information security"/><category term="Red Team"/><category term="CTF"/><category term="penetration testing"/><category term="blue team"/><category term="education"/><category term="CCDC"/><category term="Security"/><category term="Bootcamp"/><category term="lock boxx"/><category term="Pentesting"/><category term="forensics"/><category term="OS X"/><category term="CPTC"/><category term="Red Teaming"/><category term="Incident Response"/><category term="Linux"/><category term="malware"/><category term="pentest"/><category term="practice"/><category term="review"/><category term="writeup"/><category term="hackers"/><category term="programming"/><category term="web security"/><category term="windows"/><category term="exploitation"/><category term="game hacking"/><category term="macos"/><category term="training"/><category term="Web Hacking"/><category term="info sec"/><category term="reverse engineering"/><category term="PowerShell"/><category term="purple team"/><category term="python"/><category term="NCCDC"/><category term="leadership"/><category term="network security"/><category term="phishing"/><category term="GoLang"/><category term="ai"/><category term="cyber security"/><category term="persistence"/><category term="Apple"/><category term="Collegiate Penetration Testing Competition"/><category term="GScript"/><category term="Google"/><category term="Metasploit"/><category term="aws"/><category term="fun"/><category term="games"/><category term="SOC"/><category term="defense"/><category term="ALCCDC"/><category term="Escape Games"/><category term="PowerShell for Pentesters"/><category term="anonymous"/><category term="certification"/><category term="competition"/><category term="crypto"/><category term="def con"/><category term="github"/><category term="social engineering"/><category term="spy"/><category term="sql injection"/><category term="2016"/><category term="attack"/><category term="c2"/><category term="cheat engine"/><category term="command and control"/><category term="cyber"/><category term="cyber war"/><category term="hacker"/><category term="live response"/><category term="national ccdc"/><category term="puzzles"/><category term="tools"/><category term="web"/><category term="web application"/><category term="2015"/><category term="Active Measures"/><category term="Android"/><category term="OSINT"/><category term="Real Escape Games"/><category term="WRCCDC"/><category term="attack defense"/><category term="blogging"/><category term="cia"/><category term="cybersecurity"/><category term="detection testing"/><category term="espionage"/><category term="hacker news"/><category term="interview"/><category term="learning"/><category term="passwords"/><category term="red vs blue"/><category term="team building"/><category term="threat intelligence"/><category term="threat modeling"/><category term="tool"/><category term="vulnerable machine"/><category term="wireshark"/><category term=".NET"/><category term="2022"/><category term="APT"/><category term="BSides"/><category term="Bitcoin"/><category term="Escape The Room"/><category term="FBI"/><category term="PSSE"/><category term="Quals"/><category term="Risk"/><category term="VCCDC"/><category term="analysis"/><category term="blog"/><category term="cloud"/><category term="collegiate cyber defense competition"/><category term="computer security"/><category term="conference"/><category term="ctfs"/><category term="custom tools"/><category term="defcon"/><category term="detect"/><category term="emulation"/><category term="escape review"/><category term="fake news"/><category term="finals"/><category term="labs"/><category term="memory analysis"/><category term="mitm"/><category term="offense"/><category term="offensive security"/><category term="open source"/><category term="podcast"/><category term="post exploitation"/><category term="scanners"/><category term="self help"/><category term="shmoocon"/><category term="sparc flow"/><category term="theory"/><category term="trojan"/><category term="wargames"/><category term="xss"/><category term="2021"/><category term="Adversarial Tradecraft"/><category term="Astroturfing"/><category term="FireFox"/><category term="Google+"/><category term="IR"/><category term="Mac Hack"/><category term="Mach-O"/><category term="Nikhil Mittal"/><category term="OSX"/><category term="Triage"/><category term="Wireless"/><category term="analyst"/><category term="binject"/><category term="botnet"/><category term="buffer overflows"/><category term="challenge"/><category term="challenges"/><category term="competitions"/><category term="computer science"/><category term="cracking"/><category term="deception"/><category term="defense in depth"/><category term="detection"/><category term="disinformation"/><category term="dropper"/><category term="escape room"/><category term="exploit writing"/><category term="exploits"/><category term="fiction"/><category term="intel analysis"/><category term="intelligence"/><category term="intelligence gathering"/><category term="mac"/><category term="management"/><category term="networking"/><category term="offensive security tools"/><category term="owasp"/><category term="presentation"/><category term="pros vs joes"/><category term="rat"/><category term="reverse shell"/><category term="securitytube.net"/><category term="simulation"/><category term="ssl"/><category term="symbolcrash"/><category term="testing"/><category term="threat emulation"/><category term="tooling"/><category term="workshop"/><category term="2018"/><category term="2019"/><category term="2020"/><category term="2023"/><category term="Assembly"/><category term="BSidesLV"/><category term="CNA"/><category term="CNO"/><category term="China"/><category term="DDOS"/><category term="DFIR"/><category term="DNS"/><category term="DevOps"/><category term="Exam"/><category term="Facebook"/><category term="Freedom"/><category term="IC"/><category term="IDS"/><category term="Info-Sec"/><category term="Intelligence Analysis"/><category term="MMORPG"/><category term="Microsoft"/><category term="Mobile"/><category term="PHP"/><category term="Pentesters"/><category term="Pwn2Own"/><category term="RIT"/><category term="RSA"/><category term="Raspberry Pi"/><category term="SANS"/><category term="Scout2"/><category term="Shadow Cats"/><category term="Smart Phone"/><category term="Social Media"/><category term="Sony"/><category term="TLS"/><category term="Tor"/><category term="YARA"/><category term="adversarial"/><category term="alerts"/><category term="application"/><category term="attack and defense"/><category term="attacker"/><category term="attacks"/><category term="automation"/><category term="binjection"/><category term="black hat"/><category term="capture the flag"/><category term="cheat sheet"/><category term="cobalt strike"/><category term="course"/><category term="course review"/><category term="covert channel"/><category term="cyber attacks"/><category term="drop box"/><category term="ec2"/><category term="engineering"/><category term="escape game"/><category term="exfiltration"/><category term="fake"/><category term="freedom of information"/><category term="game"/><category term="globalcptc"/><category term="how to"/><category term="https"/><category term="hunting"/><category term="iOS"/><category term="implant"/><category term="influence"/><category term="infrastructure"/><category term="input validation"/><category term="mdm"/><category term="new"/><category term="news"/><category term="physical"/><category term="quest"/><category term="real life room escape"/><category term="regional"/><category term="room escape"/><category term="scripting"/><category term="server"/><category term="shmoocon 2022"/><category term="spycraft"/><category term="static analysis"/><category term="symbol crash"/><category term="table top"/><category term="the sleuth kit"/><category term="threats"/><category term="tradecraft"/><category term="virtual ccdc"/><category term="virtual machine"/><category term="virus"/><category term="volatility"/><category term="vulnerabilities"/><category term="youtube"/><category term="10.9.2"/><category term="10.9.4"/><category term="100 deadly skills"/><category term="2014"/><category term="2017"/><category term="2025"/><category term="23"/><category term="3"/><category term="8"/><category term="ARD"/><category term="AT&amp;T"/><category term="Alex Levinson"/><category term="Apps"/><category term="Asis"/><category term="BSides SF 2015"/><category term="Badge"/><category term="Blackhat"/><category term="Burp"/><category term="CISA"/><category term="CTF writeup"/><category term="Chrome"/><category term="Credit Cards"/><category term="DEFCON 26"/><category term="DOS"/><category term="EDR"/><category term="Encryption"/><category term="Evilginx2"/><category term="Fraud"/><category term="GeoHot"/><category term="GoPhish"/><category term="GoRed"/><category term="HIPS"/><category term="Holiday Hack"/><category term="IAM"/><category term="IT"/><category term="Information Security."/><category term="Internet Explorer"/><category term="JCDC"/><category term="Jonathan Levin"/><category term="KEXT"/><category term="Kali"/><category term="Kali Linux"/><category term="LA"/><category term="LLM"/><category term="LLMs"/><category term="Lateral Movement"/><category term="Learning VM"/><category term="Local Network"/><category term="Lockheed Martin"/><category term="Mac Memoryze"/><category term="Mac OS X Memory Reader"/><category term="Macintosh"/><category term="Nessus"/><category term="Net Neutrality"/><category term="NoStarchPress"/><category term="PNG"/><category term="PPP"/><category term="PRCCDC"/><category term="Pentester Academy"/><category term="Permissions"/><category term="PvJ"/><category term="PwnAdventure"/><category term="RAE"/><category term="RTFM"/><category term="Richard A Clarke"/><category term="Robert Knake"/><category term="SEO"/><category term="SPSE"/><category term="San Francisco"/><category term="Secure ID"/><category term="SecurityTube"/><category term="Sliver"/><category term="Social Web"/><category term="Stanford"/><category term="Tips"/><category term="TryHackMe"/><category term="UCF"/><category term="Update"/><category term="Vivek Ramachandran"/><category term="WPA"/><category term="Wassenaar Arrangement"/><category term="Wi-fi"/><category term="Wild West Hacking Fest"/><category term="account take over"/><category term="active defense"/><category term="add-ons"/><category term="adversary"/><category term="agent"/><category term="agents"/><category term="ahhh"/><category term="allen dulles"/><category term="art"/><category term="at large"/><category term="attack vectors"/><category term="authentication"/><category term="automated"/><category term="awareness"/><category term="azure"/><category term="backdoor"/><category term="backdoors"/><category term="backups"/><category term="beacon"/><category term="binary"/><category term="blogger"/><category term="bots"/><category term="breaking in"/><category term="brute force"/><category term="btc"/><category term="business"/><category term="bypass"/><category term="charlatan"/><category term="chat bot"/><category term="chatops"/><category term="cheat"/><category term="cloud computing"/><category term="club"/><category term="college"/><category term="collegiate pentesting competition"/><category term="command injection"/><category term="communication"/><category term="compromise"/><category term="computer history"/><category term="conferences"/><category term="configuration"/><category term="contain"/><category term="control"/><category term="counter intelligence"/><category term="counterintelligence"/><category term="critical infrastructure"/><category term="ctftime.org"/><category term="cuda"/><category term="cyber freedom"/><category term="cyber symposium"/><category term="cybercrime"/><category term="cyberpunk"/><category term="data"/><category term="data recovery"/><category term="dc562"/><category term="defense competition"/><category term="denver"/><category term="detection engineering"/><category term="discord"/><category term="docker"/><category term="drive"/><category term="dylib"/><category term="economics"/><category term="escape"/><category term="free"/><category term="fs_usage"/><category term="fuzzing"/><category term="global cyber actors"/><category term="go"/><category term="god mode"/><category term="guide"/><category term="hack"/><category term="hak5"/><category term="hashes"/><category term="history"/><category term="holiday hack challenge 2015"/><category term="humble bundle"/><category term="iPhone"/><category term="intel"/><category term="introduction"/><category term="investigate"/><category term="jail breaking"/><category term="javascript"/><category term="jonathan scott"/><category term="jonathandata1"/><category term="kill chain"/><category term="kingpin"/><category term="lean"/><category term="lets hack"/><category term="locks"/><category term="lulzsec"/><category term="macho"/><category term="man in the middle"/><category term="mike lindell"/><category term="mitre"/><category term="mobile security"/><category term="modify memory"/><category term="money"/><category term="native"/><category term="network protocols"/><category term="nfc"/><category term="nmap"/><category term="nsa"/><category term="offensive countermeasures"/><category term="operations"/><category term="patching"/><category term="payload"/><category term="pcap"/><category term="pen test"/><category term="penetration"/><category term="performance"/><category term="persistence testing"/><category term="phone security"/><category term="privacy"/><category term="process memory"/><category term="professional"/><category term="qanon"/><category term="qr code"/><category term="radare2"/><category term="raphael mudge"/><category term="recon"/><category term="reporting"/><category term="research"/><category term="response"/><category term="reverse engineering for beginners"/><category term="reversing"/><category term="rouge access point"/><category term="scam"/><category term="scanning"/><category term="scapy"/><category term="science"/><category term="scrap"/><category term="scripts"/><category term="search"/><category term="search order hijacking"/><category term="secure coding"/><category term="security awareness program"/><category term="security conferences"/><category term="security vulnerabilities"/><category term="shells"/><category term="social dynamics"/><category term="spies"/><category term="ssh"/><category term="startup"/><category term="steganography"/><category term="strategy"/><category term="tactics"/><category term="team work"/><category term="time travel"/><category term="understanding"/><category term="videos"/><category term="virtual"/><category term="virtual machines"/><category term="visibility"/><category term="vulnerability"/><category term="wordlists"/><category term="write-up"/><category term="&quot;Intelligence Analysis: A Target-Centric Approach&quot;"/><category term="*OS Internals"/><category term="1.21.7"/><category term="10.2.11"/><category term="10.3.11"/><category term="10/2/11"/><category term="10/3/11"/><category term="150"/><category term="16"/><category term="17"/><category term="18"/><category term="19"/><category term="1Hax4B"/><category term="1Hax4Bitcoin"/><category term="2.0"/><category term="2012"/><category term="2020 election"/><category term="208"/><category term="209"/><category term="21"/><category term="210"/><category term="211"/><category term="22"/><category term="24"/><category term="25"/><category term="26"/><category term="2600"/><category term="27"/><category term="2nd edition"/><category term="31337"/><category term="3ds"/><category term="4.4"/><category term="420"/><category term="60 minutes to escape"/><category term="7"/><category term="ADB"/><category term="ADHD"/><category term="AI Research"/><category term="AI Testing"/><category term="AI writting"/><category term="AMA"/><category term="AMI"/><category term="API"/><category term="ARD3"/><category term="ARDP"/><category term="ARM"/><category term="AT&amp;T Park"/><category term="ATO"/><category term="ATT&amp;CK"/><category term="Abel Wike"/><category term="Adrian Tchaikovsky"/><category term="Advent of Code 3"/><category term="Adverserial"/><category term="Agentic"/><category term="Alex Matrosov"/><category term="Alien"/><category term="An In-Depth Guide to Android&#39;s Security Architecture"/><category term="Anthony MAmore. Fraud"/><category term="Antique Room"/><category term="AoC3"/><category term="Apfell"/><category term="Apple Remote Desktop Protocol"/><category term="Artificial Intelligence"/><category term="AttackDefense"/><category term="Audible"/><category term="Audiobook"/><category term="Automater"/><category term="Automatic Maintenance"/><category term="Aws inspector"/><category term="B&amp;E"/><category term="BAHA"/><category term="BDFProxy"/><category term="BIN100"/><category term="BIN150"/><category term="BPF"/><category term="BREACH"/><category term="BSides asheville 2015"/><category term="BTFM"/><category term="Basics"/><category term="Bay Area"/><category term="BeEF"/><category term="Beau Bullock"/><category term="Bell"/><category term="Ben Clark"/><category term="Blake Masters"/><category term="Blog Response"/><category term="Book Review. information security"/><category term="Botnets"/><category term="Brawhalla"/><category term="Breaching the Cloud"/><category term="Breaking and Entering"/><category term="Broken Heart"/><category term="Burp Suite"/><category term="C#"/><category term="C&amp;C"/><category term="CCD"/><category term="CIA++"/><category term="CND"/><category term="CNE"/><category term="CNSUVA"/><category term="CPE"/><category term="CRACK99"/><category term="CSAF"/><category term="CSAW"/><category term="CWE"/><category term="Censorship"/><category term="Chinese"/><category term="Chinese Room Paradox"/><category term="Choose Your Pwn Adventure 2"/><category term="Christin Science Monitor"/><category term="Christopher Hadnagy"/><category term="Clams Don&#39;t Dance"/><category term="ClassDump"/><category term="Classic"/><category term="ClickSSL"/><category term="Closed Source"/><category term="CloudFormation"/><category term="CloudTrial"/><category term="Coding"/><category term="Comcast"/><category term="Commercial"/><category term="Common Weakness Exposure"/><category term="Computer Network Operations"/><category term="Corporate"/><category term="Cory Doctorow"/><category term="Credential Reuse"/><category term="Crowdstrike"/><category term="Cyber Defense"/><category term="CyberFed"/><category term="DEFCON 22"/><category term="DEFCON 30"/><category term="DEFCON Group"/><category term="DMA"/><category term="Daniel Suarez"/><category term="Dark Side Ops 2"/><category term="Dark Waters"/><category term="Data Exfiltration"/><category term="Dave Zwieback"/><category term="David Campbell"/><category term="David L Marquet"/><category term="David Locke Hall"/><category term="David vidal"/><category term="Dcam"/><category term="Defensive Refusal Bias"/><category term="Delaware"/><category term="Destructive"/><category term="Dichotomy"/><category term="Direct Memory Access"/><category term="Do Not Track"/><category term="Domain"/><category term="Drinking"/><category term="Drive By Download"/><category term="Droid"/><category term="Droid X"/><category term="DroidX"/><category term="Drunken Master"/><category term="EFF"/><category term="ELK"/><category term="EULA"/><category term="Edward Snowden"/><category term="Elastic Beanstalk"/><category term="Election fraud"/><category term="Electronic Fronteir Foundation"/><category term="Email"/><category term="Emotional Awareness"/><category term="Emotionally Compromised"/><category term="Engineering Cliff"/><category term="Enter The Gungeon"/><category term="Enterprise OS X"/><category term="Eric O&#39;Neill"/><category term="Ernest Cline"/><category term="Escape from Alcatraz"/><category term="EscapeSF"/><category term="EvilOSX"/><category term="Exit Game"/><category term="Export Controls for Conventional Arms and Dual-Use Goods and Technologies"/><category term="F3EAD"/><category term="FAQ"/><category term="FC Barker"/><category term="FCC"/><category term="FOCA"/><category term="Fal.Con"/><category term="Fat"/><category term="FindHim"/><category term="FireFox5"/><category term="FireWire"/><category term="Fournier"/><category term="Frank M. Ahearn"/><category term="Freaky Clown"/><category term="Free Software"/><category term="Froyo"/><category term="FruityWiFi"/><category term="Fyodor"/><category term="G8LA"/><category term="GAME150"/><category term="GAN"/><category term="GCP"/><category term="GLSE"/><category term="GOON"/><category term="GPS"/><category term="GRIMMCon"/><category term="GUI"/><category term="GWXUX"/><category term="Galak-Z"/><category term="Game of The Year"/><category term="Gametime"/><category term="Generative AI"/><category term="Georgia Weidman"/><category term="Ghost In The Shellcode 2015"/><category term="GhostInTheShellCode"/><category term="Gi0cann"/><category term="Gildart Jackson"/><category term="GingerBread"/><category term="GoRedDeath"/><category term="GoRedLoot"/><category term="GoRedPrompt"/><category term="GoRedShell"/><category term="GoRedSpy"/><category term="Google +1"/><category term="Google Circles"/><category term="Google Hangouts"/><category term="Google Sparks"/><category term="Gordon Corera"/><category term="HAM"/><category term="HAM radio"/><category term="HHC"/><category term="HID"/><category term="HTTP2"/><category term="Hacking Back"/><category term="Haxmas"/><category term="Heath Adams"/><category term="Heather Lawrence"/><category term="Hex Fiend"/><category term="Hidden Service"/><category term="Holiday Hack Challenge"/><category term="Holy Grail"/><category term="HoneyDocs"/><category term="HoneyTags"/><category term="How I Rob Banks"/><category term="I/O"/><category term="IOC"/><category term="IRC"/><category term="IRSec"/><category term="Images"/><category term="Impact Hub"/><category term="Inception"/><category term="InfoSec OASIS"/><category term="Information Dosn&#39;t Want to Be Free"/><category term="Inside Cyber Warfare"/><category term="Internals"/><category term="Intersteller"/><category term="Investment"/><category term="Ion Mihai Pacepa"/><category term="JSOC"/><category term="Java"/><category term="Javuto"/><category term="Jay Dan"/><category term="Jeremy N Smith"/><category term="Joe McCray"/><category term="JohnTheRipper"/><category term="Joint Special Operations Command"/><category term="July 12"/><category term="July 17"/><category term="Justin Hutchens"/><category term="Kase Scenarios"/><category term="Kaspersky"/><category term="Kellogg&#39;s Land"/><category term="Kelly McGonigal"/><category term="Kill"/><category term="Krebs on Security"/><category term="LA underground"/><category term="LLM content"/><category term="LOD"/><category term="LVM2"/><category term="LaForge"/><category term="Lambda"/><category term="Language of Deception"/><category term="LayerOne"/><category term="LeBonbonCroissant"/><category term="Lee Holmes"/><category term="Legion of Doom"/><category term="Let Them Theory"/><category term="Licenses"/><category term="Live stream"/><category term="Los Angeles"/><category term="M"/><category term="MH-6"/><category term="MI6"/><category term="MISP"/><category term="MOD"/><category term="MacSwiftShell"/><category term="MachOS"/><category term="MachOView"/><category term="MachoViz"/><category term="Manager&#39;s Path"/><category term="Manufacturing Consent"/><category term="Marshall Goldsmith"/><category term="Masters of Deception"/><category term="Matthew May"/><category term="Matthew Monte"/><category term="Mavericks"/><category term="Mel Robinson"/><category term="Memory"/><category term="Merlin"/><category term="Michael Bazzell"/><category term="Michael Hayden"/><category term="Michal Zalewski"/><category term="Mikko Hyppönen"/><category term="Mile High"/><category term="Misc 150"/><category term="Models"/><category term="Mojave"/><category term="Motorola"/><category term="Mozilla"/><category term="MsSQL"/><category term="MySQL"/><category term="NLP"/><category term="NSM"/><category term="NVC"/><category term="Nadean H Tanner"/><category term="NahamCon"/><category term="National"/><category term="Noam Chomsky"/><category term="Nonviolent communication"/><category term="North Carolina"/><category term="Nuit Du Hack 2014"/><category term="OBA"/><category term="OSI model"/><category term="OST"/><category term="OWTF"/><category term="Observability"/><category term="Onion Rings"/><category term="Oregon"/><category term="OverTheWire"/><category term="Overcoming the Obstacles to Psychological Balance and Compassion"/><category term="PA"/><category term="PCI"/><category term="PDO"/><category term="PSP-3061"/><category term="Palace Games"/><category term="PanIQ Room"/><category term="Parallax"/><category term="Passcode"/><category term="Paul Ekman"/><category term="Payment system"/><category term="Penetration Testing: A Hands-On Introduction to Hacking"/><category term="Persistence of Vision"/><category term="Peter Kim"/><category term="Peter Theil"/><category term="Philadelphia"/><category term="Philly"/><category term="Phone"/><category term="Playing in Tactic"/><category term="Plugin"/><category term="Portland"/><category term="PowerShell Remoting"/><category term="Prison"/><category term="Propeller"/><category term="Proprietary"/><category term="PsExec"/><category term="Puppet"/><category term="PuppetLabs"/><category term="Pwn Adventure 3"/><category term="PwnAdventureZ"/><category term="PwnPi"/><category term="Python for Secret Agents"/><category term="Python for Security Professionals"/><category term="QW5kcmV3"/><category term="Quest Factor"/><category term="RDP"/><category term="RDS"/><category term="RE4B"/><category term="RPISEC"/><category term="Real Time"/><category term="Recon-ng"/><category term="Red Team Field Manual"/><category term="RedCloud Infosec"/><category term="Registry"/><category term="Relentless Strike"/><category term="Remotely"/><category term="Remoting"/><category term="Responder.py"/><category term="Rights"/><category term="Rishi Modi"/><category term="Robert Hanssen"/><category term="Robert Spaulding"/><category term="Rochester Institute Of Technology"/><category term="Ronald J Rychlak"/><category term="Runestone"/><category term="SCE"/><category term="SCTP"/><category term="SE"/><category term="SIEM"/><category term="SMB"/><category term="SRE"/><category term="STRIDE"/><category term="Safari"/><category term="Salt"/><category term="San Jose"/><category term="Santa"/><category term="Scheduled Tasks"/><category term="Science Fiction"/><category term="Scraper"/><category term="Sean Naylor"/><category term="Secuinside CTF"/><category term="SecurID"/><category term="SecurePlanet"/><category term="Security Chaos Engineering"/><category term="Security Competitions"/><category term="Security Onion 2"/><category term="Serverless"/><category term="Shares"/><category term="Shell"/><category term="Shellbot"/><category term="Silent Break Sec"/><category term="Sinan Aral"/><category term="Site Reliability Engineering"/><category term="Slackware"/><category term="Slava Gomzin"/><category term="Smashing the stack"/><category term="Software Licensing"/><category term="Sophie Perrone"/><category term="Space travel"/><category term="Spam Nation"/><category term="Special Forces"/><category term="Spin"/><category term="Stay Alert"/><category term="Steven Lott"/><category term="Stuxnet"/><category term="Subway Butcher"/><category term="Support"/><category term="Swarm"/><category term="Switches"/><category term="System"/><category term="T1"/><category term="TAMUctf"/><category term="TCC"/><category term="TCM"/><category term="TTX"/><category term="Taipei"/><category term="Taiwan"/><category term="Team Ten4-able"/><category term="Tedx"/><category term="Terraria"/><category term="The Art of Exploitation"/><category term="The Castle"/><category term="The Dali Lama"/><category term="The Hacker Playbook"/><category term="The Human Element of Security"/><category term="The Internet"/><category term="The Office"/><category term="The Phoenix Project"/><category term="The Tangled Web"/><category term="The Upside to Stress"/><category term="Thomas Rid"/><category term="Tony and Friends"/><category term="TowerFall"/><category term="Trainings"/><category term="Transfer Files"/><category term="Trolling"/><category term="URL"/><category term="Uber"/><category term="Ubuntu"/><category term="Unbearable"/><category term="United States of America"/><category term="University of Washington"/><category term="Unmasking the Social Engineer"/><category term="User Space"/><category term="VC"/><category term="VRCCDC"/><category term="Venture Deals"/><category term="VilleTown"/><category term="VirusTotal"/><category term="VolgaCTF"/><category term="Vyrus"/><category term="WA"/><category term="WEP"/><category term="WGYHWGYT"/><category term="WMI"/><category term="WOPR"/><category term="WPA2"/><category term="WPS"/><category term="WScript"/><category term="Web Goat"/><category term="Web Scarab"/><category term="Web Server"/><category term="Welcome"/><category term="Wesley Thijs"/><category term="Whatweb"/><category term="Wheelz"/><category term="WheelzApp"/><category term="Wicked Cool PHP"/><category term="Wil Wheaton"/><category term="William R Johnson"/><category term="Windows NT"/><category term="Windows Phone"/><category term="Workflow"/><category term="XSS Rat"/><category term="YMBAB"/><category term="You must build a boat"/><category term="YourWebsite2Go"/><category term="Zero to One"/><category term="Zerospace"/><category term="a burglars guide to the city"/><category term="aaia"/><category term="academic"/><category term="access point"/><category term="account center"/><category term="active directory"/><category term="activeX"/><category term="actor"/><category term="actor centric approach"/><category term="actuarial approach"/><category term="adam shostack"/><category term="admin"/><category term="adolf tolkachev"/><category term="adversarial AI"/><category term="adverserial tradecraft"/><category term="agent swarm"/><category term="albert gonzales"/><category term="algorithms"/><category term="altimeter"/><category term="amateur radio"/><category term="amazon"/><category term="american kingpin"/><category term="amiibo"/><category term="amiibomb"/><category term="amy stweart"/><category term="analytics"/><category term="andrew grove"/><category term="andrew thompson"/><category term="andy greenberg"/><category term="anonymity"/><category term="ant-cheat"/><category term="anti-cheat"/><category term="anti-phishing"/><category term="aob scanning"/><category term="ap"/><category term="apis"/><category term="apple events"/><category term="appscript"/><category term="apt 32"/><category term="apt emulation"/><category term="architecture"/><category term="armitage"/><category term="arpanet"/><category term="art forensics"/><category term="art of the con"/><category term="asheville"/><category term="atm"/><category term="attack trees"/><category term="attacker mindset"/><category term="atul gawande"/><category term="autologon"/><category term="autopsy"/><category term="awspx"/><category term="babycmd"/><category term="back door factory"/><category term="backblaze"/><category term="backdoor factory"/><category term="banking"/><category term="bash"/><category term="bash bunny"/><category term="bayes rule"/><category term="beez-fight"/><category term="bellingcat"/><category term="best"/><category term="beyond blame"/><category term="bgb"/><category term="billion dollar spy"/><category term="binary analysis"/><category term="bitcoin address authentication"/><category term="black energy"/><category term="black hat go"/><category term="black hills"/><category term="black listing"/><category term="black market"/><category term="blind"/><category term="blinkist"/><category term="blocking"/><category term="blog posts"/><category term="blue"/><category term="blue coat"/><category term="blue team toolkit"/><category term="blue teams"/><category term="bluespawn"/><category term="bluetooth"/><category term="board presentations"/><category term="bolo"/><category term="booby traps"/><category term="book"/><category term="bootkits"/><category term="bottom up"/><category term="bounty"/><category term="boxman"/><category term="brain game"/><category term="brain virus"/><category term="breaking"/><category term="bro"/><category term="broforce"/><category term="browsers"/><category term="bruce schneier"/><category term="brute-force"/><category term="bsides SF 2017"/><category term="bug bounty"/><category term="building"/><category term="bundles"/><category term="busted"/><category term="c++"/><category term="calculation"/><category term="campaign"/><category term="can&#39;t hurt me"/><category term="capital"/><category term="captain crunch"/><category term="card editing"/><category term="carders"/><category term="care"/><category term="cartography"/><category term="cdc"/><category term="cell phone"/><category term="cellular"/><category term="ceo"/><category term="cert"/><category term="certified CyberDefender"/><category term="chainbreaker"/><category term="change management"/><category term="cheat table"/><category term="checklist manifesto"/><category term="circuit diagram"/><category term="clear text"/><category term="cli"/><category term="cliff stoll"/><category term="clone"/><category term="cloudmapper"/><category term="cmu"/><category term="coaching"/><category term="code"/><category term="code signing"/><category term="cognitive bias"/><category term="cold war"/><category term="collective pentesting"/><category term="collectives"/><category term="comepition"/><category term="command line"/><category term="comment"/><category term="common cyber attacks"/><category term="common sense approach"/><category term="communications"/><category term="compression"/><category term="computer exploitation"/><category term="computer hacking"/><category term="computer network defense"/><category term="computer seizure"/><category term="con"/><category term="concent"/><category term="conference review"/><category term="conficker"/><category term="consciousness"/><category term="continuous deployment"/><category term="cookies"/><category term="coolabrative"/><category term="cooperation"/><category term="correlation attack"/><category term="cost center"/><category term="countdown to zero day"/><category term="counter"/><category term="counter hack"/><category term="counter terrorism"/><category term="cozy croissant"/><category term="crack"/><category term="crafting the infosec playbook"/><category term="cram"/><category term="crashing"/><category term="credential dump"/><category term="credential gathering"/><category term="crime"/><category term="crimedotcom"/><category term="criminal science"/><category term="criminology"/><category term="critical thinking"/><category term="cross platform"/><category term="cross site scripting"/><category term="crypto scam"/><category term="crypto war"/><category term="cryptowars"/><category term="cta"/><category term="cuckoo"/><category term="cuckoo&#39;s egg"/><category term="cudaHashCat"/><category term="cult of the dead cow"/><category term="cyber mentor"/><category term="cyber plumber"/><category term="cyber spies"/><category term="cybrary.it"/><category term="daemon"/><category term="dandridge malone"/><category term="darkweb"/><category term="data analysis"/><category term="data and goliath"/><category term="data flow diagrams"/><category term="data security"/><category term="data theft"/><category term="database"/><category term="david deutsch"/><category term="david goggins"/><category term="david talbot"/><category term="dead cells"/><category term="debreif"/><category term="debugging"/><category term="decentalized"/><category term="decentrelized"/><category term="decompile"/><category term="deconstruct"/><category term="deep packet inspection"/><category term="deep work"/><category term="def con 26"/><category term="default"/><category term="defcon 27"/><category term="defcon 32"/><category term="defender"/><category term="defensive security handbook"/><category term="delete"/><category term="deployment"/><category term="destroy"/><category term="detective"/><category term="developers"/><category term="development"/><category term="development and operations"/><category term="devil&#39;s chessboard"/><category term="digital"/><category term="digital currency"/><category term="digital identities"/><category term="digital rights"/><category term="dinobank"/><category term="dirb"/><category term="dirtycow"/><category term="disassemble"/><category term="disney"/><category term="dll"/><category term="dll injection"/><category term="docker-compose"/><category term="docs"/><category term="documentation"/><category term="domain admin"/><category term="domain controller"/><category term="door"/><category term="dox"/><category term="drive-by download"/><category term="dumping ram"/><category term="duo"/><category term="dynamic"/><category term="dynamic analysis"/><category term="dynamic library"/><category term="easy"/><category term="ebCTF"/><category term="elastic stack"/><category term="election hacking"/><category term="electric grid"/><category term="electronic badges"/><category term="empire"/><category term="energy"/><category term="engine"/><category term="enlightenment"/><category term="enterprise"/><category term="epic team adventures"/><category term="eric ries"/><category term="errata"/><category term="escalation"/><category term="ethical hacking"/><category term="ethics village"/><category term="evade"/><category term="event logs"/><category term="events"/><category term="evil"/><category term="evil dead 2"/><category term="examples"/><category term="executable"/><category term="executive"/><category term="exercise"/><category term="experience"/><category term="explanations"/><category term="exploding the phone"/><category term="exploitable"/><category term="explore"/><category term="ext4"/><category term="extreme ownership"/><category term="factfulness"/><category term="fake rce"/><category term="fakenews"/><category term="falcon force"/><category term="fallout"/><category term="fallout 4"/><category term="fallout 76"/><category term="false positives"/><category term="fast"/><category term="fastboot"/><category term="fbctf"/><category term="fdisk"/><category term="feedback"/><category term="file recovery"/><category term="file system"/><category term="find"/><category term="findstr"/><category term="firewall"/><category term="fixing the 7 fatal flaws of thinking"/><category term="flag"/><category term="flame"/><category term="flaws.cloud"/><category term="fleet management"/><category term="flipper"/><category term="flipper zero"/><category term="floppyCTF"/><category term="flow"/><category term="fls"/><category term="focus"/><category term="founder"/><category term="founders"/><category term="framework"/><category term="frauds"/><category term="free money"/><category term="fsecure"/><category term="fseventer"/><category term="ftp"/><category term="fundamentals"/><category term="funds"/><category term="future"/><category term="game boy"/><category term="game changer"/><category term="game theory"/><category term="game-changer"/><category term="gatekeeper"/><category term="general"/><category term="geoff white"/><category term="gettingintoinfosec"/><category term="ghost in the shellcode"/><category term="ghost in the wires"/><category term="gitsc"/><category term="global"/><category term="gmail"/><category term="go-netscan"/><category term="gold"/><category term="golden ticket"/><category term="gpp"/><category term="graphics"/><category term="graphs"/><category term="graphviz"/><category term="greatness"/><category term="guest"/><category term="hack crack"/><category term="hack like a ghost"/><category term="hack like a god"/><category term="hack like a legend"/><category term="hack like a pornstar"/><category term="hack or hack"/><category term="hack or play"/><category term="hack_or_hack"/><category term="hack_or_play"/><category term="hacked"/><category term="hacker conference"/><category term="hacker playbook 3"/><category term="hacker valley blue"/><category term="hacking sites"/><category term="hackorhack"/><category term="hackorplay"/><category term="hackthebox.eu"/><category term="hadnagy"/><category term="handbook"/><category term="hands-on blue team exercises"/><category term="happiness"/><category term="hardware"/><category term="hardware hacking"/><category term="harry king"/><category term="hash length extension"/><category term="hash values"/><category term="hashcat"/><category term="haveibeenpwned"/><category term="header information"/><category term="hex editor"/><category term="high output management"/><category term="high security"/><category term="hijacking"/><category term="history of internet"/><category term="hitcon"/><category term="homework"/><category term="host based"/><category term="hostapd"/><category term="hotkeys"/><category term="hourglass escapes"/><category term="how to disappear"/><category term="how to hack like a pornstar"/><category term="how-to"/><category term="human"/><category term="hunt for red apples"/><category term="hxd"/><category term="hybrid"/><category term="hydra"/><category term="iDigitalFlame"/><category term="iPredator"/><category term="ibutton"/><category term="icat"/><category term="iceman"/><category term="identification"/><category term="identity"/><category term="if its smart its vulnerable"/><category term="implants"/><category term="improved"/><category term="independent"/><category term="industrial"/><category term="industroyer"/><category term="industry"/><category term="information"/><category term="information warfare"/><category term="infosec conference"/><category term="infosec pentesting"/><category term="infrared"/><category term="innovation"/><category term="insomni&#39;hack"/><category term="instagram"/><category term="intelligence community"/><category term="intelligence operations"/><category term="internal testing"/><category term="intro"/><category term="intrusion software"/><category term="inventor"/><category term="iptables"/><category term="jamf"/><category term="jean greaves"/><category term="jean-philippe aumasson"/><category term="jock wilink"/><category term="joe rogan"/><category term="john draper"/><category term="john the ripper"/><category term="joke post"/><category term="jonathan lee"/><category term="jonathan villareal"/><category term="joseph menn"/><category term="joy bubbles"/><category term="jumbo patch"/><category term="katie hafner"/><category term="kerberos"/><category term="kernel extensions"/><category term="kevin mitnick"/><category term="kevin poulson"/><category term="key logger"/><category term="keychain"/><category term="keyloggers"/><category term="kim zetter"/><category term="kingdom of cats"/><category term="kitkat"/><category term="kon-boot"/><category term="krbtgt"/><category term="ladislav bittman"/><category term="las vegas"/><category term="launch agents"/><category term="launch deamons"/><category term="lavalink"/><category term="law enforcement"/><category term="laws"/><category term="layout"/><category term="lbc"/><category term="le bonbon croissant"/><category term="leaders"/><category term="leaders eat last"/><category term="lean startup"/><category term="learn"/><category term="lecture"/><category term="leetspeak"/><category term="leif babin"/><category term="license"/><category term="license.txt"/><category term="lie"/><category term="lifecycle"/><category term="lintile"/><category term="lists"/><category term="live blog"/><category term="live updates"/><category term="livectf"/><category term="lobbycon"/><category term="local file inclusion"/><category term="lock"/><category term="lock picking"/><category term="lockboxx"/><category term="lockpicking"/><category term="lockpicks"/><category term="logic analyzer"/><category term="logisim"/><category term="logs"/><category term="los angles"/><category term="lua"/><category term="lying"/><category term="magic"/><category term="magnet"/><category term="maksik"/><category term="malicious"/><category term="mandiant"/><category term="manufacturing"/><category term="mar rogers"/><category term="markets"/><category term="massive"/><category term="mathwhiz"/><category term="max butler"/><category term="max vision"/><category term="md5"/><category term="meaning"/><category term="meetup"/><category term="memo"/><category term="mental fortitude"/><category term="meow wolf"/><category term="meta"/><category term="meta account"/><category term="meta tags"/><category term="metal detector"/><category term="metal slug x"/><category term="meteor"/><category term="methodology"/><category term="metrics"/><category term="micromdm"/><category term="mimikatz"/><category term="mint your own money"/><category term="miscreated"/><category term="misinformation"/><category term="mmls"/><category term="mods"/><category term="monitoring"/><category term="monitors"/><category term="mono"/><category term="monopoly"/><category term="monster train"/><category term="motivation"/><category term="movement"/><category term="movie"/><category term="munki"/><category term="musicbot"/><category term="mvp"/><category term="nash equilibrium"/><category term="national defense"/><category term="nationalcptc"/><category term="necrodancer"/><category term="neo4j"/><category term="netstat"/><category term="network attacks and exploitation"/><category term="network based"/><category term="new osx book"/><category term="new york times"/><category term="newosxbook"/><category term="ngpew"/><category term="nick cano"/><category term="nicole perlroth"/><category term="nintendo"/><category term="nishang"/><category term="no starch press"/><category term="no tech hacking"/><category term="node"/><category term="nodejs"/><category term="non-interactive"/><category term="noninteractive"/><category term="ntp"/><category term="o5logon"/><category term="ocean lotus"/><category term="oculus"/><category term="omescape"/><category term="onion routing"/><category term="online"/><category term="online behavioral advertising"/><category term="open security training"/><category term="open source intelligence"/><category term="operating systems"/><category term="operational security"/><category term="operator"/><category term="opportunity"/><category term="oracle-brute-stealth"/><category term="osquery"/><category term="osxpmem"/><category term="package"/><category term="packet hacking village"/><category term="pacu"/><category term="paid lesson"/><category term="pandemic"/><category term="paramerized queries"/><category term="pass the ticket"/><category term="passcode cup"/><category term="path"/><category term="payloads"/><category term="peacemaker"/><category term="pen testing"/><category term="penetration test"/><category term="pentest dropbox"/><category term="pentest report"/><category term="pentester night school"/><category term="permanent record"/><category term="phishing kits"/><category term="phishtank"/><category term="phone phreaking"/><category term="php object injection"/><category term="phreaking"/><category term="physical assessment"/><category term="physical pentesting"/><category term="pi"/><category term="picoCTF"/><category term="pillage"/><category term="pkg"/><category term="plaintext"/><category term="plan"/><category term="planning"/><category term="plants"/><category term="playbook"/><category term="playing to the edge"/><category term="plist"/><category term="pmapper"/><category term="pocorgtfo"/><category term="police"/><category term="polyglot"/><category term="positivity"/><category term="post mortem"/><category term="postfix"/><category term="prepare"/><category term="prepared"/><category term="prepared statements"/><category term="prevention"/><category term="principles of adversarial operations"/><category term="prisoners dilemma"/><category term="privilege escalate"/><category term="privilege escalation"/><category term="privilege mapper"/><category term="process injection"/><category term="professionals"/><category term="profile"/><category term="profiles"/><category term="program security"/><category term="project"/><category term="proof of concept"/><category term="proof of concept or get the fuck out"/><category term="propaganda"/><category term="proto-hack"/><category term="prowler"/><category term="proxy"/><category term="psychology"/><category term="puzzle"/><category term="pyschology"/><category term="python 3.3"/><category term="qbot"/><category term="quackbot"/><category term="qualifiers"/><category term="quality control"/><category term="questions"/><category term="r2"/><category term="radio"/><category term="radius"/><category term="raising"/><category term="raphi"/><category term="rapid release"/><category term="rc"/><category term="read"/><category term="reader"/><category term="reading"/><category term="ready player one"/><category term="real escape game"/><category term="realescapegame"/><category term="realistic"/><category term="red"/><category term="red balloon security"/><category term="red team into"/><category term="redballoonsecurity"/><category term="reframing"/><category term="regionals"/><category term="remediation"/><category term="remote"/><category term="remote management"/><category term="report"/><category term="reputation tracking"/><category term="resiliency"/><category term="respond"/><category term="responders dilemma"/><category term="responders fallacy"/><category term="reviews"/><category term="rfid"/><category term="risk assessment"/><category term="risk centric approach"/><category term="robert cialdini"/><category term="robert clark"/><category term="robo-dialers"/><category term="rockstars"/><category term="roguebook"/><category term="root cause"/><category term="rootkits"/><category term="rouge"/><category term="rpg"/><category term="rule"/><category term="run"/><category term="run books"/><category term="ryan haley"/><category term="ryptic"/><category term="saleae"/><category term="salted-sha512-pbkdf2"/><category term="saltstack"/><category term="sam curry"/><category term="sandworm"/><category term="sanitizing data"/><category term="save edit"/><category term="save file"/><category term="save the net"/><category term="sci fi"/><category term="scoring"/><category term="screenshot"/><category term="searching"/><category term="seattle escape games"/><category term="security awareness"/><category term="security engineers"/><category term="security onion"/><category term="security program"/><category term="security through obscurity"/><category term="security tube"/><category term="security with go"/><category term="seize"/><category term="sentinel"/><category term="serial port"/><category term="serious cryptography"/><category term="service model"/><category term="shaping"/><category term="shell coding"/><category term="shellcon"/><category term="shimming"/><category term="shortcuts"/><category term="show"/><category term="sign"/><category term="silicon valley"/><category term="silkroad"/><category term="silverman"/><category term="simon sinek"/><category term="single sign on"/><category term="situational awareness"/><category term="skimming"/><category term="slay the spire"/><category term="sleuth kit"/><category term="small unit"/><category term="smart grid"/><category term="sneakers"/><category term="snort"/><category term="snowden"/><category term="social engineer"/><category term="software"/><category term="software engineering"/><category term="solved"/><category term="soupnazi"/><category term="spark notes"/><category term="spark of resistance"/><category term="speaker"/><category term="speed"/><category term="speedrun"/><category term="spy schools"/><category term="sqlite3"/><category term="srm"/><category term="ssl pinning"/><category term="stack"/><category term="startup items"/><category term="static"/><category term="statistics"/><category term="stealth war"/><category term="steve wozniak"/><category term="sticky keys"/><category term="stopping"/><category term="stress kills"/><category term="strike plate"/><category term="study"/><category term="stunt hacking"/><category term="suites"/><category term="surveillance"/><category term="survival"/><category term="swampCTF"/><category term="switch"/><category term="sysinternals"/><category term="system32"/><category term="tagmo"/><category term="tainted grail"/><category term="take over"/><category term="teaching"/><category term="team"/><category term="team lead"/><category term="team server"/><category term="teamwork"/><category term="teaser"/><category term="technical writting"/><category term="technician"/><category term="template"/><category term="test"/><category term="the 5th domain"/><category term="the beginning of infinity"/><category term="the darkness II"/><category term="the fifth domain"/><category term="the georgetown morgue"/><category term="the lean startup"/><category term="the psychology of persuasion"/><category term="the user account you are operating under does not have permission to disable this task."/><category term="the-backdoor-factory"/><category term="theft"/><category term="thehackerscrew"/><category term="thief"/><category term="thieves"/><category term="think like a hacker"/><category term="this is how they tell me the world ends"/><category term="threacare"/><category term="threat actor"/><category term="threat centric approach"/><category term="threat hunting"/><category term="threat simulation"/><category term="tit for tat"/><category term="toctou"/><category term="toxicology"/><category term="traffic"/><category term="traffic analysis"/><category term="tragedy of the commons"/><category term="transparency"/><category term="travis bradberry"/><category term="trends"/><category term="triage time"/><category term="tribe of hackers"/><category term="tricks"/><category term="troll"/><category term="trust"/><category term="tum"/><category term="uart"/><category term="ubeeri"/><category term="udp"/><category term="unbaised"/><category term="underground"/><category term="unity"/><category term="universal"/><category term="universities"/><category term="unrestricted release"/><category term="usb forensics"/><category term="uscc"/><category term="vault"/><category term="vendors"/><category term="verify"/><category term="version 4"/><category term="victim"/><category term="video"/><category term="violent python"/><category term="viper"/><category term="virtual box"/><category term="virtual reality"/><category term="visualizations"/><category term="visualize"/><category term="vm"/><category term="vms"/><category term="volafox"/><category term="volume 1"/><category term="volunteering"/><category term="waledac"/><category term="war"/><category term="war games"/><category term="warden"/><category term="watering hole"/><category term="web directories"/><category term="weirdAAL"/><category term="what got you here won&#39;t get you there"/><category term="where wizards stay up late"/><category term="whistle blower"/><category term="white listing"/><category term="white paper"/><category term="who"/><category term="wifi"/><category term="wifite"/><category term="wii"/><category term="wil allsopp"/><category term="winning"/><category term="winning the brain game"/><category term="wiper"/><category term="wireless profiles"/><category term="work in progress"/><category term="workspace"/><category term="worm"/><category term="writing"/><category term="wwg1wga"/><category term="x64"/><category term="x86"/><category term="xcape"/><category term="xkcd"/><category term="zelda"/><category term="zine"/><title type='text'>LockBoxx</title><subtitle type='html'>A Hacker&#39;s Blog</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>676</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8621396705130357451</id><published>2026-04-04T09:03:00.000-07:00</published><updated>2026-04-04T09:03:00.110-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Agentic"/><category scheme="http://www.blogger.com/atom/ns#" term="agents"/><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="Artificial Intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="Models"/><category scheme="http://www.blogger.com/atom/ns#" term="Swarm"/><title type='text'>Book Review: &quot;Agentic Artificial Intelligence&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/s1000/Agentic_AI.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;665&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/w266-h400/Agentic_AI.jpg&quot; width=&quot;266&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&quot;Agentic Artificial Intelligence: Harnessing AI Agents to Reinvent Business, Work, and Life&quot; by Pascal Bornet. This book was written at the very beginning of the agentic AI wave, looking at early adopters of using LLMs in agents to have generic language models drive computer tools. It has some great lessons learned on implementing agentic systems, but it’s largely non-technical, likely because it was written before these systems became standardized.. I listened to this &lt;a href=&quot;https://www.amazon.com/Agentic-Artificial-Intelligence-Harnessing-Reinvent/dp/B0F1KFKNBB&quot;&gt;on Audible&lt;/a&gt; at about ~$15 for roughly 10 hours (on 1.5x speed).&amp;nbsp; At nearly 500 pages it&#39;s a pretty heavy read, although I personally found the first two parts the most impactful in terms of AI theory and implementation insights. The final three parts shift toward business building, enterprise adoption, and long-term societal impact. While the end of the book seemed to depart from reality a bit (talking about Universal Basic Income once agents take over the majority of jobs), I thought the beginning was fascinating and eye opening in terms of planning and reasoning with agents. Overall I&#39;m going to give this 5 out of 10 stars. I recommend this to people wanting to get more theory and guidance when building out agentic systems, although I&#39;m not sure I would recommend this if you were looking for a technical book. The book has no real mention of actual technology needed to implement these ideas. There is almost no mention of specific models, structures, or even the types of agents that could be run to automate these goals. In that sense the book left a lot to be desired, it was almost purely theory.&amp;nbsp; That said, I did enjoy the first two parts of the book. The following are the chapters of the book so you can get a better idea of it&#39;s contents before picking it up:&lt;/p&gt;&lt;p&gt;Introduction&lt;br /&gt;&lt;b&gt;Part 1: The Rise of AI Agents&lt;/b&gt;&lt;br /&gt;Chapter 1: Beyond ChatGPT: The Next Evolution of AI&lt;br /&gt;Chapter 2: The Five Levels of AI Agents: From Automation to Autonomy&lt;br /&gt;Chapter 3: Inside the Mind of an AI Agent&lt;br /&gt;Chapter 4: Putting AI Agents to the Test&lt;br /&gt;&lt;b&gt;Part 2: The Three Keystones of Agentic AI&lt;/b&gt;&lt;br /&gt;Chapter 5: Action: Teaching AI to Do, Not Just Think&lt;br /&gt;Chapter 6: Reasoning: From Fast to Wise&lt;br /&gt;Chapter 7: Memory: Building AI That Learns&lt;br /&gt;&lt;b&gt;Part 3: Entrepreneurship and Professional Growth with AI Agents&lt;/b&gt;&lt;br /&gt;Chapter 8: A Practical Guide For Building Successful AI Agents&lt;br /&gt;Chapter 9: From Ideas to Income: Business Models for the Agent Economy&lt;br /&gt;&lt;b&gt;Part 4: Enterprise Transformation Through Agentic AI&lt;br /&gt;&lt;/b&gt;Chapter 10: Human-Agent Collaboration: Leadership, Trust, and Change&lt;br /&gt;Chapter 11: Scaling AI Agents From Vision to Reality&lt;br /&gt;Chapter 12: Case Study and Use Cases of Agents Across Industries&lt;br /&gt;&lt;b&gt;Part 5: Future Horizons For Work and Society&lt;br /&gt;&lt;/b&gt;Chapter 13: The New World of Work&lt;br /&gt;Chapter 14: Society in the Age of Agents&lt;br /&gt;Conclusion&lt;/p&gt;&lt;p&gt;I struggled with parts of the book, because it repeatedly argues that agents should take action, but rarely explains &lt;i&gt;how&lt;/i&gt; that action is implemented.. Should agents be calling APIs in a microservice architecture, or should we be giving agents full control of systems with local tools like ClawdBot? Is it better to give agents skills on how to use specific tools, or should we continue using MCP servers for up-to-date information on the tools? There is a ton of implementation details the book conveniently glosses over. The book also glosses over memory in a similar way, which in my experience if done wrong can make an agentic system much worse. Memory has lots of core questions, like storage location and structure, as well as retrieval quality and embedding limitations. It&#39;s a pretty hard thing to get right, so I&#39;m surprised it didn&#39;t dive into any of the technical edge cases there. One technique the book does mention in depth is using an extensive RAG library or even a wiki or onboarding documents to support the agentic system if it needs to lookup context or understanding around a process. The book is also very idealistic. From it&#39;s estimations on agentic reasoning capabilities (nearly a year after it was written and these models still make regular mistakes) to it&#39;s predictions around Universal Basic Income when many common jobs are automated, it honestly makes me a little worried what a more grounded future might look like when I see these as proposed solutions.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/HXy3J1mGHRE?si=j307aro6QxFc0i9R&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/8621396705130357451/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8621396705130357451' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8621396705130357451'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8621396705130357451'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/04/book-review-agentic-artificial.html' title='Book Review: &quot;Agentic Artificial Intelligence&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/s72-w266-h400-c/Agentic_AI.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-1242194826733710165</id><published>2026-04-01T09:25:00.000-07:00</published><updated>2026-04-01T09:25:24.382-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI writting"/><category scheme="http://www.blogger.com/atom/ns#" term="blogging"/><category scheme="http://www.blogger.com/atom/ns#" term="LLM content"/><category scheme="http://www.blogger.com/atom/ns#" term="technical writting"/><title type='text'>On The Rise of AI Augmented Writing</title><content type='html'>&lt;p&gt;Welcome back Internet people! Lately I&#39;ve seen a rise in AI generated articles, blog posts, and even book content. I need to say loudly, as a reader,&amp;nbsp;&lt;b&gt;this is a major turnoff&lt;/b&gt;. If a reader can tell that something was written by AI, then the tools are being used poorly.&amp;nbsp;&lt;b&gt;Please don’t pass off LLM output directly as human writing&lt;/b&gt;. It makes your work output feel cheap. AI should be used as a writing tool, it shouldn&#39;t be replacing human writers altogether.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When writers use LLM output verbatim the result is often stale and lacks clarity. In many cases, it actually makes ideas harder to understand. Current LLMs struggle to maintain consistent, logical models of complex ideas. So while the writing may sound polished at first, it sometimes misrepresents concepts or drifts into conflicting, multiple definitions. Moving past the coherency issues, it&#39;s often obvious when a writer has an overreliance on verbatim LLM output. There are many obvious &lt;i&gt;tells&lt;/i&gt;. From the overuse of the em dash, to the nonsensical use of the colon; AI generated content sticks out to those who use frontier models often. Certain phrasing patterns also stand out. For example: “It’s not X, it’s Y.” As a writer, this often feels like filler. Just write about Y. Just because these are the current form of these &lt;i&gt;tells&lt;/i&gt; doesn&#39;t mean these are universal or ubiquitous &lt;i&gt;tells&lt;/i&gt;. Quite the opposite, these will change over time as the models change, but the heavy users of the models will very likely recognize their output when used verbatim.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Don&#39;t get me wrong, &lt;i&gt;I&#39;m not saying don&#39;t use LLMs to help you write&lt;/i&gt;. I previously wrote about &lt;a href=&quot;https://lockboxx.blogspot.com/2024/11/ai-augmented-technical-writing.html&quot;&gt;how to use AI in your technical writing&lt;/a&gt;, such as creating templates, voice files, and dynamic prompts to generate rich content. It also makes for a great editor! But one of the key takeaways there is in the last paragraph, where I emphasize heavily modifying and adapting the output. You can&#39;t use the output verbatim; frontier LLM output is just too recognizable.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I recently read this great and thoughtful article titled &quot;&lt;a href=&quot;https://alexhwoods.com/dont-let-ai-write-for-you/&quot;&gt;Don&#39;t Let AI Write For You&lt;/a&gt;&quot;, where Alex Woods lays out that the point of writing is to develop and cement thoughts worth communicating, not simply generating words or content. I couldn&#39;t agree with this more. I often use LLMs to help expand on ideas, or think about edge cases I might be considering. I use it to help me refine my writing prompts and generate starting points. But very rarely do I use the ideas or output verbatim. It&#39;s an incredibly useful tool, but in my opinion it shouldn&#39;t replace the art all together.&amp;nbsp;&lt;/p&gt;&lt;p&gt;So I&#39;ll repeat it, and I hope somewhere out there other writers take it to heart. When writers use LLM output verbatim it comes across as incredibly lazy. And frankly, why would anyone read that? A reader could just prompt the model themselves and get the same result.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/s912/stars.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;280&quot; data-original-width=&quot;912&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/w640-h196/stars.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/1242194826733710165/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/1242194826733710165' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1242194826733710165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1242194826733710165'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/04/on-rise-of-ai-augmented-writing.html' title='On The Rise of AI Augmented Writing'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/s72-w640-h196-c/stars.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-9174668462974331521</id><published>2026-03-18T04:07:00.000-07:00</published><updated>2026-03-18T04:25:08.619-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adversarial AI"/><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="GAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Book Review: &quot;Adverserial AI Attacks, Mitigations, and Defense Strategies&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/s1000/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;811&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/w325-h400/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg&quot; width=&quot;325&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
I recently finished &quot;Adversarial AI Attacks, Mitigations, and Defense Strategies: A Cybersecurity professional&#39;s guide to AI attacks, threat modeling, and securing AI with ML/SecOps&quot; the book by John Sotiropoulos.&amp;nbsp;The book is a deep dive into adversarial machine learning, focusing heavily on how AI models can be attacked across their lifecycle, from training and supply chain to deployment and inference, using techniques like poisoning, perturbations, and model extraction. The book is a great deep dive on model-level security and the various mode-level adversarial attacks. I grabbed the book &lt;a href=&quot;https://www.amazon.com/Adversarial-Attacks-Mitigations-Defense-Strategies-ebook/dp/B0D6RB24H8/&quot;&gt;for about ~$30&lt;/a&gt;, mostly because they were a fellow Packt author, and read it over the course of a long weekend.&amp;nbsp; Overall, I&#39;m give this book 6 out of 10 stars. At over 600 pages, it’s a dense read, and even though it’s divided into a handful of major parts, the structure doesn’t always make it easier to navigate. I&#39;m sure this type of content is useful to some kind of academic or maybe a company actually making and hardening the models themselves, but I&#39;m not sure general security practitioners could apply most of this book. It strikes me as the difference between cryptography security (attacking the algorithms) and applied cryptography security (attacking systems using crypto). The former would have an extremely small audience and applicability, whereas the later is very useful to most security engineers. This book is the former, but for AI. The quality isn’t the issue, it’s more that the content doesn’t map well to the needs of most security practitioners.The book is clearly focused on a model-centric view of AI security, and that shapes both its strengths and weaknesses. A large portion of the content is focused on algorithmic attacks against machine learning models themselves, using techniques such as poisoning, evasion, extraction, inversion, etc. The book goes into meaningful depth on how these techniques work, which is neat, but these feel very much like academic attacks to me as a practitioner.&amp;nbsp;That makes it a strong resource for understanding how models can fail at a mathematical or behavioral level, and introduced me to a lot of resources to that extent, such as the &lt;a href=&quot;https://github.com/Trusted-AI/adversarial-robustness-toolbox&quot;&gt;Adversarial Robustness Toolbox&lt;/a&gt;.&amp;nbsp;This gives the material a practical edge and makes it easier to reproduce attacks in a controlled environment, allowing you to see the techniques for yourself.&amp;nbsp; In my typical style, here are the chapters of the book, so you can get a better understanding of the content:&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;Chapter 1: Getting Started with AI&lt;/div&gt;&lt;div&gt;Chapter 2: Building Our Adversarial Playground&lt;/div&gt;&lt;div&gt;Chapter 3: Security and Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 4: Poisoning Attacks&lt;/div&gt;&lt;div&gt;Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming&lt;/div&gt;&lt;div&gt;Chapter 6: Supply Chain Attacks and Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 7: Evasion Attacks against Deployed AI&lt;/div&gt;&lt;div&gt;Chapter 8: Privacy Attacks: Stealing Models&lt;/div&gt;&lt;div&gt;Chapter 9: Privacy Attacks: Stealing Data&lt;/div&gt;&lt;div&gt;Chapter 10: Privacy-Preserving AI&lt;/div&gt;&lt;div&gt;Chapter 11: Generative AI: A New Frontier&lt;/div&gt;&lt;div&gt;Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks&lt;/div&gt;&lt;div&gt;Chapter 13: LLM Foundations for Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 14: Adversarial Attacks with Prompts&lt;/div&gt;&lt;div&gt;Chapter 15: Poisoning Attacks and LLMs&lt;/div&gt;&lt;div&gt;Chapter 16: Advanced Generative AI Scenarios&lt;/div&gt;&lt;div&gt;Chapter 17: Secure by Design and Trustworthy AI&lt;/div&gt;&lt;div&gt;Chapter 18: AI Security with MLSecOps&lt;/div&gt;&lt;div&gt;Chapter 19: Maturing AI Security&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Where the book does particularly well is in drawing a clear distinction between recognition-based AI systems and generative AI systems, and explaining how different their attack surfaces really are. The treatment of traditional models, image classifiers, NLP predictors, and similar systems, focuses on adversarial examples and perturbation-based attacks that manipulate outputs without changing the underlying model. In contrast, the discussion of generative AI shifts toward prompt injection, jailbreaking, indirect attacks through retrieved content, and abuse of tool integrations. This distinction is important, because it highlights how generative AI expands the attack surface to language driven control of systems, which is particularly relevant today with the rise of agents. There is also a really good history of the evolution of these systems throughout the book, which is helpful historical context to get. Another thing the book does pretty well is give the reader a hands-on introduction to generative models, particularly GANs, before moving into how they can be abused. It doesn’t just stay conceptual, it walks through building a GAN from scratch, explaining the generator–discriminator dynamic and how they’re trained against each other. The book walks you through building your own naive GANs for things such as deep fakes, which is certainly fun although I&#39;m not sure how truly useful. Further the defensive content is generally less detailed and less operational than the attack content. There is comparatively little guidance on how to implement security controls in real GAN pipelines, how to monitor for abuse, or how to use AI to improve existing cloud and application security practices. To me, the audience is clearly people doing research in adversarial machine learning or teams that are actually building and hardening their own models from the ground up. For that group, the depth on model-level attacks is probably useful. But for a general security practitioner, especially someone working on real-world systems that integrate AI rather than build it, much of the content feels difficult to apply. The scenarios are often centered on directly attacking or manipulating models in ways that just aren’t relevant if your organization is primarily consuming third-party models through APIs like ChatGPT or Claude.&amp;nbsp;That model-centric perspective is also reflected in the book’s implicit assumption that organizations own and train their models. Much of the threat model revolves around scenarios like model theft, training data poisoning, and tampering with serialized model artifacts. While these are valid concerns, they are less aligned with how many enterprises actually use AI today. Most organizations are consumers of models rather than builders, relying on APIs from foundational models. In those environments, the attack surface shifts away from model internals and toward things like API misuse, prompt injection, data leakage through retrieval, and access control failures. As a result, some of the book’s most detailed attack scenarios can feel somewhat removed from the day-to-day risks faced by most security teams out there. We can hear John talk below about the OWASP top 10 AI risks :&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/-vXoC0UvpjY?si=4TCKgQHxsQdbYow2&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/9174668462974331521/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/9174668462974331521' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/9174668462974331521'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/9174668462974331521'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/03/book-review-adverserial-ai-attacks.html' title='Book Review: &quot;Adverserial AI Attacks, Mitigations, and Defense Strategies&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/s72-w325-h400-c/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6825164890668381113</id><published>2026-03-05T07:49:00.000-08:00</published><updated>2026-03-05T07:49:28.450-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI Research"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Defensive Refusal Bias"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><title type='text'>Defensive Refusal Bias in LLMs is Hurting Infosec</title><content type='html'>&lt;p&gt;Last year a few of us in infosec &lt;a href=&quot;https://lockboxx.blogspot.com/2025/04/red-teaming-at-nccdc-2025.html&quot;&gt;met up for the National CCDC competition&lt;/a&gt; and did some LLM research while at the competition. We gathered data from both the defenders and the attackers on their ussage of LLMs and how well the technology aided them in the competition. This research goes on to show that these LLMs really aren&#39;t helping the blue teams, especially when paired with the evolutionary direction i&#39;ve seen ALCCDC go. We can see a clear bias towards tools like Claude Code enabling offensive tool development and helping attackers, to the extent that the agent swarm will activly hack for the attacker, whereas the blue teams are struggling to get simple questions answered from LLMs like ChatGPT for the fear that the information may be abused.&amp;nbsp;&lt;/p&gt;&lt;p&gt;What we found became the basis of our &lt;a href=&quot;https://arxiv.org/abs/2603.01246&quot;&gt;research on Defensive Refusal Bias&lt;/a&gt;, but the story has only gotten more interesting since then. During the competition we collected thousands of real prompts from both blue and red interacting with LLMs. The results showed something counterintuitive: modern safety-aligned models were far more likely to refuse legitimate defensive questions than they were to block creative offensive questions. Blue teams trying to analyze malware, harden systems, or investigate suspicious processes were frequently blocked because their requests looked “too much like hacking.” Meanwhile, attackers could often get what they needed simply by framing their prompts as experimentation, scripting help, or development work.&lt;/p&gt;&lt;p&gt;Fast forward to spring 2026, and the gap appears to be widening. After just completing events like &lt;a href=&quot;https://lockboxx.blogspot.com/2026/03/alccdc-2026-review.html&quot;&gt;ALCCDC last weekend&lt;/a&gt;, tools like Claude Code are rapidly evolving into autonomous agent swarms, capable of developing deep offensive capabilities, writing exploit scripts, chaining reconnaissance tools, and iterating quickly on offensive tooling. Not only that, with some clever prompting and abstraction, Claude Code will drive an offensive agent swarm as an operator, doing fully automated hacking and post-exploitation of victim systems. In practice, what this means is that attackers can now spin up something closer to an offensive agent collective, a set of automated assistants that will explore systems, write exploits, refine attacks collaboratively, and move to post exploitation activities. They will also leverage their own post exploitation for creative attack chains moving forward. Instead of just answering questions, the model increasingly acts as a co-developer and operator for offensive tradecraft, where defenders are getting stopped when asking simple analysis questions.&lt;/p&gt;&lt;p&gt;Defenders are often stuck fighting the safety rails. Ask a model to help analyze a piece of malware or break down how an exploit works, and there’s a decent chance you’ll get a refusal or a heavily sanitized answer. The irony is hard to miss: the same guardrails meant to prevent misuse are often slowing down the people trying to defend systems, where the attackers are using the readily available, professional models today at blazing speeds to auto-hack.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/s1024/AI_Agent_Hydra.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/w640-h640/AI_Agent_Hydra.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/6825164890668381113/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6825164890668381113' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6825164890668381113'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6825164890668381113'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/03/defensive-refusal-bias-in-llms-is.html' title='Defensive Refusal Bias in LLMs is Hurting Infosec'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/s72-w640-h640-c/AI_Agent_Hydra.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4628652852281526248</id><published>2026-03-04T08:40:00.000-08:00</published><updated>2026-03-04T08:40:19.498-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="agent swarm"/><category scheme="http://www.blogger.com/atom/ns#" term="agents"/><category scheme="http://www.blogger.com/atom/ns#" term="ALCCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="CCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="collective pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="collectives"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="virtual ccdc"/><title type='text'>ALCCDC 2026 Review</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/s1536/RedvsBlue.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1536&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/w400-h266/RedvsBlue.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This was another amazing year for At Large CCDC, or Virtual CCDC as I&#39;ve come to call it. We had our event this last weekend, Feb 28th and March 1st. I lead the red team again this year (&lt;a href=&quot;https://lockboxx.blogspot.com/2025/03/alccdc-2025-review.html&quot;&gt;last year&#39;s writeup faithful reader&lt;/a&gt;) and the core CIAS team hosted the environment for teams to attack/defend. Overall the competition was intense and engaging. We had 5 blue teams this year and just around 10 individual red teamers. We played zone, in the sense that we essentially hacked across all the teams in an equal manner, targeting specific services with sweeping exploits and laying down equivlent persistence. This is opposed to &quot;man-to-man&quot; or playing in a way where we pair specific red team members to specific blue teams, much the way we do nationals.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This year Dakota state won again. It wasn&#39;t even really that close, they are getting really good. I would go out to say Dakota state dominated, playing a near perfect game relative to the other teams. I would also say the remaining teams were fairly closely grouped, with the next two teams being fairly equivalent in the middle, and the last two teams being fairly equal in last. I would argue the other teams should do their best to learn from the &lt;a href=&quot;https://defsec.club/doku.php?id=ccdc_checklist&quot;&gt;DSU playbook&lt;/a&gt;, because it is a &lt;a href=&quot;https://github.com/DSU-DefSec/ace&quot;&gt;winning model&lt;/a&gt;. They have a &lt;a href=&quot;https://github.com/DSU-DefSec/DWAYNE-INATOR-5000&quot;&gt;ton of infra&lt;/a&gt; for hosting your own CCDC-style attack and defense competition. There are a ton of great resources there for up-ing your personal game and emulating the way DSU plays.&amp;nbsp;&lt;/p&gt;&lt;p&gt;On to what I really want to write about from a pentest perspective. The competition is becoming dominated by AI written tooling, agents, and agent swarm pentesting. I&#39;m not convinced yet, often times these tools are much sloppier, more reckless, and harder to control. If you thought pentesters were reckless and hard to control these agent swarms are so much worse. They also do incredibly obvious and silly things that will easily get caught, in an adversarial competition you can&#39;t really afford to make those kinds of silly mistakes. One person suggested it was because these haven&#39;t been post-tuned in a real world environment and thus were not battle tested. I would need to see these things get remarkably better from an operator perspective before allowing them again, they often don&#39;t apply attacks evenly or fairly which is a key feature of our red team at CCDC. Further, I wonder if they could understand how well a blue team is doing and adapt their attacks to level of skill. Regardless, it&#39;s a trend I want to comment on. From what I’ve observed so far, AI-enabled pentesting tools generally fall into two categories.&lt;/p&gt;&lt;p&gt;1. AI-Assisted Tool Development&lt;/p&gt;&lt;p&gt;The first approach uses AI like Claude Code to help write pentesting tools. Operators prompt a model to generate scripts, exploit logic, automation helpers, or reconnaissance tooling. The human still controls the attack, but AI accelerates the process of building the tools. Sometimes the model is helping set up the project directly, but I find it&#39;s often more productive when the human does the architecting and guides the features they want, and simply uses the AI to script the advanced features, like an LKM in-memoery loader, or similar features, as opposed to using the LLM to guiding those features. These systems tend to work quite well. In fact, some of the most interesting tooling I’ve seen recently has come from this approach. You get creative automation and rapid tool development without sacrificing operator control. This results in stable tools are develop quickly with extremely powerful features.&amp;nbsp;&lt;/p&gt;&lt;p&gt;2. AI-Pentester Operator Agent Swarm&lt;/p&gt;&lt;p&gt;The other approach I&#39;ve seen uses AI agents that do the cognition and drive the tools. These tend to be more unhinged, and I imagine burn thousands of tokens just in the cognition of the attacks, which feels like less sustainable than using the tokens to write the tool. These are the systems that tend to behave the most erratically. Even the agent swarms that abstract the cognition through layers of agents have issues, such as sub-agent permissions, logging, runaway tasks, emergent behavior, and several other operational challenges that become very apparent once these systems are running in a live adversarial environment. I think a lot of the &lt;a href=&quot;https://techcrunch.com/2025/06/28/anthropics-claude-ai-became-a-terrible-business-owner-in-experiment-that-got-weird/&quot;&gt;Claudius experiments&lt;/a&gt; show this, as powerful, amazing, and fast as the agents are they just aren&#39;t there yet in terms of planning and metacognition. Models are almost always better when you give them very narrow tasks, and thats what the agent swarm attempts to do, break up the the scope of the tasks into smaller, and smaller context windows of focused tasks. On top of that, the second approach feels like it just burns tokens in a crazy way, especially when the agent swarm becomes misfocused or off-task.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I will have a lot more thoughts on these tools and this evolution of pentesting in the coming weeks to months. Stay tuned and let me know in the comments if you have thoughts or find this content interesting&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/4628652852281526248/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4628652852281526248' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4628652852281526248'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4628652852281526248'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/03/alccdc-2026-review.html' title='ALCCDC 2026 Review'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/s72-w400-h266-c/RedvsBlue.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4066569547606047964</id><published>2026-02-15T14:32:00.000-08:00</published><updated>2026-02-16T12:39:38.847-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="conference"/><category scheme="http://www.blogger.com/atom/ns#" term="ctfs"/><category scheme="http://www.blogger.com/atom/ns#" term="denver"/><category scheme="http://www.blogger.com/atom/ns#" term="electronic badges"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="Mile High"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Trainings"/><category scheme="http://www.blogger.com/atom/ns#" term="Wild West Hacking Fest"/><title type='text'>Wild West Hacking Fest Review (Denver 2026)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/s2560/WWHF_Final_3.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1978&quot; data-original-width=&quot;2560&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/w400-h309/WWHF_Final_3.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We just wrapped this year&#39;s &#39;Mile-High&#39; Wild West Hacking Fest. This was my second time attending the Denver event (distinct from the Deadwood conference), and the growth year over year has been impressive (&lt;a href=&quot;https://lockboxx.blogspot.com/2025/02/my-first-wild-west-hacking-fest-denver.html?q=Wild+West+hacking+Fest&quot;&gt;read about the first one here&lt;/a&gt;). It keeps the laid-back, community-driven vibe that made it great to begin with, but the conference experience itself has leveled up in a big way. I personally like this one (over Deadwood) as I think it&#39;s much more accessible in downtown Denver, although I&#39;ve never actually been to the other event. There are so many amazing features of this conference I want to highlight.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;To start, the conference app deserves a callout. It’s wasn&#39;t just a flat / static schedule, you can browse, and even watch presentations streamed live. If you can’t physically make it to a session, you can still follow along. That level of accessibility really sets it apart.&amp;nbsp;They also run an active Discord server with dedicated channels for every track, workshop, and game. Slides get shared in real time, and conversations continue well beyond the talk itself. It makes Q&amp;amp;A more engaging and helps you connect with other attendees organically. I even joined a pickup team through Discord to compete in a CTF later.&lt;br /&gt;&lt;br /&gt;I definitely want to highlight the pre-conference training as it was amazing. You can read &lt;a href=&quot;https://lockboxx.blogspot.com/2026/02/course-review-breaching-cloud-with-beau.html&quot;&gt;my review here&lt;/a&gt;. Not only do they offer dedicated training before the conference, but the trainings are also streamed over the app. There are also free workshops during the event that anyone can drop into. And the content spread is excellent. There are advanced sessions diving deep into topics like shellcode curation, alongside beginner-friendly talks and workshops for those newer to the field. It was nice to see the conference strike more of a balance this year.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Speaking of a better skill spread, there were three CTFs this year and felt like something for everyone. There was an intro CTF, an electronic badge challenge, and a full Attack/Defense competition. I think this was really nice as people could engage at any level of experience.&amp;nbsp; Beyond the talks and CTFs, there’s was a very lively vendor area, plus some seriously fun lockpicking challenges. The speed-picking competition alone is worth watching as people get intensely competitive.&lt;/p&gt;&lt;p&gt;It also still feels really small. With roughly 300–500 attendees across just two floors of a single hotel, it feels intimate and approachable. You can strike up conversations with speakers, organizers, and fellow attendees without fighting crowds. It reminds me of the old DerbyCon days, tight-knit, accessible, and community-focused, but with even more structured content and activities.&lt;/p&gt;&lt;p data-end=&quot;2901&quot; data-start=&quot;2681&quot;&gt;If you’re looking for a conference that combines strong technical content, hands-on activities, real community engagement, and a relaxed atmosphere, you should seriously consider going to Mile-High Wild West Hacking Fest, It’s one of the few events that still feels small in the best possible way, while delivering a big-conference experience.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/4066569547606047964/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4066569547606047964' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4066569547606047964'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4066569547606047964'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/02/wild-west-hacking-fest-review-denver.html' title='Wild West Hacking Fest Review (Denver 2026)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/s72-w400-h309-c/WWHF_Final_3.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4576834103311158923</id><published>2026-02-12T09:22:00.000-08:00</published><updated>2026-02-12T12:35:46.466-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="aws"/><category scheme="http://www.blogger.com/atom/ns#" term="azure"/><category scheme="http://www.blogger.com/atom/ns#" term="Beau Bullock"/><category scheme="http://www.blogger.com/atom/ns#" term="Breaching the Cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="GCP"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Team"/><category scheme="http://www.blogger.com/atom/ns#" term="Wild West Hacking Fest"/><title type='text'>Course Review: Breaching the Cloud With Beau Bullock</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/s686/breaching_the_cloud.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;386&quot; data-original-width=&quot;686&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/w640-h360/breaching_the_cloud.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;I recently took an Antisyphon training,&amp;nbsp;&lt;a href=&quot;https://www.antisyphontraining.com/product/breaching-the-cloud-with-beau-bullock/&quot;&gt;Breaching the Cloud With Beau Bullock&lt;/a&gt;, at the &lt;a href=&quot;https://wildwesthackinfest.com/wild-west-hackin-fest-mile-high-2026/&quot;&gt;Mile High Wild West Hacking Fest 2026&lt;/a&gt;. I thought this was a fantastic training for intermediate infosec practitioners, and want to detail a few reasons why. The training was very cheap compared to other industry trainings, with most SANS or black hat trainings ranging from 2-5k. This course comes in around &lt;b&gt;$575&lt;/b&gt; which makes it similar to trainings like &lt;a href=&quot;https://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender_30.html&quot;&gt;The Certified Cyber Defender&lt;/a&gt; in terms of price and access (its also available on demand). That alone makes it accessible in a way most “elite” trainings simply aren’t. You do get a certificate of completion for this, but unlike the CCD because there is no exam it doesn&#39;t hold too much weight in terms of a verification that the person knows the material. That said, certificates are always nice to get along w/ the sticker price. One aspect I wanted to callout is that Beau goes pretty fast through the content, and there is a ton of content. There are over 420+ slides and 18 hands-on labs throughout the course. The course is only 2 days of in-person, so I get why he has to go fast. Personally, I like it because it is enough to cover the material but let students dig in on their own time if they want more. As a pretty experienced infosec practitioner, a decent amount of the material was also review for me, so it was nice to rip through it from that perspective as well. The material is modern and relevant, comfortably within the last 2–5 years of cloud pentesting tradecraft. This isn’t recycled theory or checkbox cloud security, the course is packed with high-impact tools and techniques for initial access, cloud-native reconnaissance, lateral movement, and privilege escalation across real cloud environments.&amp;nbsp;The course is dense with practical tooling and techniques: tons of scanners, identifying cloud-native weaknesses, pivoting through an organizations roles, and understanding where identity and access failures really hurt. There’s very little time wasted on low-impact “cloud vulnerabilities” that look scary in a scanner report but don’t meaningfully move an engagement forward. This is&amp;nbsp;&lt;a href=&quot;https://medium.com/@haarlems/review-of-antisyphon-on-demand-trainings-671866aaf15c&quot;&gt;another great review&amp;nbsp;&lt;/a&gt;that really encapsulates that, &quot;You&#39;re paying for the experience of the instructor&quot;, not simply more rote pentesting content. And Beau is one of the best operators that has been doing this for several decades, so his hands on experience really cuts through a lot of the fluff out there. In my typical review style, the following are the hands on labs in the course to help you get a better understanding of the content:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Lab 1: S3 Bucket Pillaging&lt;/li&gt;&lt;li&gt;Lab 2: Password Spraying&lt;/li&gt;&lt;li&gt;Lab 3: Pillage Code Repos for Secrets&lt;/li&gt;&lt;li&gt;Lab 4: Microsoft Device Code Phishing&lt;/li&gt;&lt;li&gt;Lab 5: Azure Situational Awareness&lt;/li&gt;&lt;li&gt;Lab 6: Backdooring an AWS Account&lt;/li&gt;&lt;li&gt;Lab 7: Azure Service Principal Backdoor&lt;/li&gt;&lt;li&gt;Lab 8: Using AzureHound to Find PrivEsc&lt;/li&gt;&lt;li&gt;Lab 9: AWS Privilege Escalation w/ Pacu &amp;amp; Obtaining Web Console Access&lt;/li&gt;&lt;li&gt;Lab 10: ScoutSuite AWS Scanning&lt;/li&gt;&lt;li&gt;Lab 11: Screenshot Web Services&lt;/li&gt;&lt;li&gt;Lab 12: Exploiting SSRF to Gain IAM Keys&lt;/li&gt;&lt;li&gt;Lab 13: Extract Password Hashes from VM Storage&lt;/li&gt;&lt;li&gt;Lab 14: Dumping Azure Key Vaults&lt;/li&gt;&lt;li&gt;Lab 15: Exploiting Amazon Elastic Container Service (ECS)&lt;/li&gt;&lt;li&gt;Lab 16: Exploiting AWS Lambda Functions&lt;/li&gt;&lt;li&gt;Lab 17: Azure App Services Phishing w/ Illicit Consent Grant&lt;/li&gt;&lt;li&gt;Lab 18: ROADTools Entra ID Analysis w/ CAPS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The course has a big focus on both Azure and AWS. Many cloud classes go deep on a single provider and leave students mentally trapped there. This one does a good job showing the parallels, how the same underlying identity, application settings, and misconfiguration patterns appear across cloud platforms. I found there was a decent bit of overlap with FalconForce&#39;s &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2025/08/course-review-advanced-detection.htm&quot;&gt;Advanced Detection Engineering in the Enterprise&lt;/a&gt;&quot;, in terms of some of the offensive cloud techniques presented, although that had more of a focus on the defensive techniques and it was only looking at Azure. I really like that the course gave you a lot of custom terraform such that you could host the testing environments yourself. You’re not just clicking through someone &lt;span style=&quot;font-family: inherit;&quot;&gt;else’s&lt;/span&gt; pre-baked lab, you’re learning how these environments are actually built, broken, and you could even fix the vulns yourself. The course also heavily leveraged &lt;a href=&quot;https://github.com/RhinoSecurityLabs/cloudgoat&quot;&gt;CloudGoat&lt;/a&gt; for some terraformed vulnerable cloud environments, which is an absolutely fantastic project that I also leveraged in &lt;a href=&quot;https://lockboxx.blogspot.com/2024/02/cptc-2023-finals-review.html&quot;&gt;CPTC2023&lt;/a&gt;&amp;nbsp;and while training for my &lt;a href=&quot;https://lockboxx.blogspot.com/2022/12/aws-certified-security-specalist.html&quot;&gt;AWS Cloud Specalist cert&lt;/a&gt;. The class even covers many parallels with GCP, although it doesn&#39;t have us host any GCP infrastructure to pentest.&amp;nbsp;There’s also strong coverage of cloud-to-on-prem and on-prem-to-cloud attack paths, which is where real organizations still get burned. This isn’t cloud-in-a-vacuum theory, it’s hybrid red teaming grounded in real world examples. While the course doesn&#39;t implement a ton of best practices in it&#39;s own lab setup, Beau makes a point of highlighting good cloud theory in terms of the envs we are pentesting and the recommendations. The labs modeled proper group structure and role assumption workflows the way large organizations actually operate. The slides also cover the use of secrets managers and key vaults instead of hardcoded credentials or lazy storage patterns. Theres also a ton of coverage on cloud specific technologies, like writing security policy in AWS or leveraging Entra ID for better subscription management.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Ultimately, I highly recommend this course for both the price point and the instructor. The emphasis stays squarely on high-impact red team tradecraft: identity abuse, role chaining, secrets exposure, cloud-to-on-prem boundary crossing, and realistic privilege escalation paths inside mature environments. These are the techniques that materially change the outcome of an engagement. They’re practical, repeatable, and aligned with how real organizations actually operate. There’s a noticeable absence of fluff. The content doesn’t wander into obscure edge cases or theoretical attack paths that rarely survive contact with production environments. Instead, it concentrates on methods that consistently produce leverage. That curation is intentional and it reflects experience. When an instructor has spent decades operating in the field, the signal-to-noise ratio improves dramatically. You get the attacks that work, the patterns that scale, and an understanding of cloud patterns that comes from doing the job repeatedly.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnaGCJEkMYWJF8bRH2FQE70fe5jJucNWj03RkNvLtsrryHyBDaWmi0eRcvpj_W6upUBqiStWq-A9E3aQiqGL_YlyTbyagr-EZDZZDXPjVU4NznQxeHIGf8TjQQmManFL1Fz5UfWUEGwaq-84HrDP_3uqd1whHxh1xqMWuKpk3YYnMA4NA9wseIbYn1nO3b/s2170/btc.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1672&quot; data-original-width=&quot;2170&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnaGCJEkMYWJF8bRH2FQE70fe5jJucNWj03RkNvLtsrryHyBDaWmi0eRcvpj_W6upUBqiStWq-A9E3aQiqGL_YlyTbyagr-EZDZZDXPjVU4NznQxeHIGf8TjQQmManFL1Fz5UfWUEGwaq-84HrDP_3uqd1whHxh1xqMWuKpk3YYnMA4NA9wseIbYn1nO3b/w400-h309/btc.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/4576834103311158923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4576834103311158923' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4576834103311158923'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4576834103311158923'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/02/course-review-breaching-cloud-with-beau.html' title='Course Review: Breaching the Cloud With Beau Bullock'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/s72-w640-h360-c/breaching_the_cloud.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-2500350876588133471</id><published>2026-01-28T07:39:00.000-08:00</published><updated>2026-02-11T07:40:54.627-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="100 deadly skills"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="MI6"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Team"/><category scheme="http://www.blogger.com/atom/ns#" term="spy"/><title type='text'>Book Review: &quot;MI6 Spy Skills For Civilians&quot;</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/s1000/mi6spyskills.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;647&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/w259-h400/mi6spyskills.jpg&quot; width=&quot;259&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&quot;MI6 Spy Skills For Civilians: A Former British Agent Reveals How to Live Like A Spy - Smarter, Sneakier, and Ready for Anything.&quot; by Red Riley is an interesting book that explores some espionage tradecraft. I’m not going to lie, I picked this book up at SpyScape NYC, which is a super fun augmented-reality arcade and spy museum in Manhattan (New York City). I read the book casually over a few days, mostly browsing through the various tips and tricks rather than reading it straight through. I paid&amp;nbsp;&lt;a href=&quot;https://www.amazon.com/Mi6-Spy-Skills-Civilians-real-life/dp/1948174405&quot;&gt;roughly $17 for the book&amp;nbsp;&lt;/a&gt;in person, and honestly, I wouldn’t really recommend it to anyone. Overall, I’d give this book 3 out of 10 stars. While it does seem grounded in some real techniques, the emphasis and tone surrounding those techniques feel extremely off. There are far better books available for this type of learning. If the book took itself more seriously, it could make for a solid coffee table book or a conversation starter. As it stands, I think I’d just end up cherry-picking a few useful points rather than revisiting it as a whole.&amp;nbsp;I picked this book up hoping it would be like &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2023/01/book-review-osint-techniques.html&quot;&gt;OSINT Techniques&lt;/a&gt;&quot;, &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2017/10/book-review-spycraft.html&quot;&gt;Spycraft&lt;/a&gt;&quot; or &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2018/10/book-review-craft-of-intelligence.html&quot;&gt;The Craft of Intelligence&lt;/a&gt;&quot; but rather I think this book sells itself less as a serious spy skill book and more as a flashy Hollywood spy book. I think this book tries to sell itself like Clint Emerson&#39;s &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2021/07/book-review-100-deadly-skills.html&quot;&gt;100 Deadly Skills&lt;/a&gt;&quot;, but &quot;MI6 Spy Skills&quot; comes off as overly flashy whereas &quot;100 Deadly Skills&quot; comes off as practical in the field. The book constantly references James Bond films, both visually and in how it describes the “danger” agents supposedly face. It’s honestly a bit ludicrous to suggest that the average intelligence officer is regularly getting into life-or-death fistfights while traveling on a train in a foreign country. In reality, that would represent a worst-case scenario. The last thing any real agent wants is a physical confrontation or the attention of law enforcement or any other authority figures. In my typical style the following are the sections and chapters of the book:&lt;br /&gt;&lt;br /&gt;Chapter 1: Personal Image&lt;br /&gt;Chapter 2: Avoiding Surveillance&lt;br /&gt;Chapter 3: Mobile Surveillance&lt;br /&gt;Chapter 4: Travel&lt;br /&gt;Chapter 5: Dead Letter Boxes&lt;br /&gt;Chapter 6: Brush Contacts&lt;br /&gt;Chapter 7: Self-Defense&lt;br /&gt;Chapter 8: Innocuous Weapons&lt;br /&gt;Chapter 9: Natural Weapons&lt;br /&gt;Chapter 10: Weapons Defense&lt;br /&gt;Chapter 11: Escape &amp;amp; Evasion&lt;br /&gt;Chapter 12: Subterfuge&lt;br /&gt;Chapter 13: Intelligence Gathering&lt;br /&gt;Chapter 14: Personal First Aid&lt;br /&gt;Chapter 15: Basic Agent Extraction&lt;br /&gt;Chapter 16: Advanced Insertion &amp;amp; Extraction&lt;br /&gt;Chapter 17: Other Helpful Tips &amp;amp; Techniques&lt;p&gt;&lt;/p&gt;&lt;p data-end=&quot;3319&quot; data-start=&quot;2900&quot;&gt;Some of the best, and most practically useful, content for red teamers appears in the chapter on &lt;strong data-end=&quot;3013&quot; data-start=&quot;2995&quot;&gt;Brush Contacts&lt;/strong&gt;, in my opinion. These sections contain genuinely useful ideas and were one of the main reasons I picked the book up after thumbing through it. Tips such as waiting near elevator banks, escalators, or bus stops can be genuinely effective locations for brush contacts or even cloning physical access badges. This chapter, along with others like the one on dead drops, really emphasizes that parts of the book are grounded in real-world experience. Unfortunately, that grounding is undermined by the nearly 50+ pages devoted to improvised weapons and hand-to-hand combat, which make the book feel unrealistic and far more like Hollywood spy fiction. Don’t get me wrong, this approach probably sells well to the uninitiated. But real intelligence work is often incredibly boring. It usually involves observation, pattern tracking, and note-taking week after week, with very little actually happening. Most agents never want to engage in physical altercations, and many would consider a mission compromised if one occurred at all. That said, there &lt;em data-end=&quot;4064&quot; data-start=&quot;4059&quot;&gt;are&lt;/em&gt;&amp;nbsp;some good or common-sense tips scattered throughout the book. The guidance on remaining inconspicuous is fairly solid: things like wearing non-distinct clothing, never running, avoiding looking over your shoulder, and minimizing unnecessary interactions. The advice to change your outfit and approach routes when revisiting a location for reconnaissance is also sound. Still, the majority of the book feels like it’s pretending to be an action-movie secret agent manual rather than providing skills actual agents would find useful. I was also surprised by the near total absence of computer skills or technical tradecraft, especially given how central cyber operations are to modern intelligence work. No video for this one, just a friendly reminder that overly flashy and embellished techniques are rarely as real or practical as the boring, non-sexy ones. You should always be wary of anyone claiming to do intelligence work while presenting it like they’re some kind of 007.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/2500350876588133471/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/2500350876588133471' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/2500350876588133471'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/2500350876588133471'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2026/02/book-review-mi6-spy-skills-for-civilians.html' title='Book Review: &quot;MI6 Spy Skills For Civilians&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/s72-w259-h400-c/mi6spyskills.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7693205593225584757</id><published>2025-12-30T02:25:00.000-08:00</published><updated>2025-12-30T02:34:53.831-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blue team"/><category scheme="http://www.blogger.com/atom/ns#" term="Bootcamp"/><category scheme="http://www.blogger.com/atom/ns#" term="CCD"/><category scheme="http://www.blogger.com/atom/ns#" term="cert"/><category scheme="http://www.blogger.com/atom/ns#" term="Exam"/><category scheme="http://www.blogger.com/atom/ns#" term="forensics"/><title type='text'>Course Review: Certified CyberDefender (CCD)</title><content type='html'>&lt;p&gt;I recently passed the &lt;a href=&quot;https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/&quot;&gt;Certified CyberDefender&lt;/a&gt; (CCD). Ultimately I think there is a lot of value in this certification and I think it finds a unique spot within the industry.&amp;nbsp;If you treat CCD as a hands-on validation of blue-team and DFIR skills, it performs well. It&#39;s almost like a blue team version of the OSCP, which is funny considering the slogan on the challenge coin is, &quot;Defend Smarter, Not Harder&quot; (vs the classic offensive slogan, &quot;Try Harder&quot;). The combined cost of the labs and exam are approximately &lt;b data-end=&quot;933&quot; data-start=&quot;922&quot;&gt;$499.99&lt;/b&gt;, which I consider very reasonable given the scope and hands-on nature of the material. I spent roughly&lt;b&gt; &lt;/b&gt;&lt;span data-end=&quot;1078&quot; data-start=&quot;1037&quot;&gt;one week reviewing the course content&lt;/span&gt;, followed by &lt;span data-end=&quot;1137&quot; data-start=&quot;1092&quot;&gt;four additional days working through labs&lt;/span&gt; before attempting the exam. However this may be an accelerated rate for people that are newer to the subject material. The exact &lt;a href=&quot;https://cyberdefenders.org/static/files/CCD_Syllabus.pdf&quot;&gt;contents of the course is here&lt;/a&gt;, so you can make sure this specific skill development is what you are looking for.&lt;/p&gt;
&lt;p data-end=&quot;1360&quot; data-start=&quot;1167&quot;&gt;From a return-on-investment perspective, the labs alone justify the price. Even experienced practitioners will find value in the scenarios, tooling exposure, and repetition across environments.&amp;nbsp;The scenarios require investigation, hypothesis testing, and iterative analysis, much closer to real SOC or DFIR work than most other certifications. If you approach them like a real incident, with partial visibility and incomplete information, they feel authentic and worthwhile. I also like how most of the training has detailed instructions, followed by videos demonstrating the techniques, and finally a lab environment for participants to then try themselves. That said, some of the material and theory leaves a bit to desired. I wrote about some of this in &lt;a href=&quot;https://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender.html&quot;&gt;my IR review&lt;/a&gt;, I&#39;m talking about getting basic formulas for Risk incorrect or muddling the incident response lifecycle.&amp;nbsp;The full course has similar issues, for example it instructs students to perform live response exercises like log collection and live system triage before capturing memory. In my experience you always want to capture memory first before running more live response tools as they can push evidence out of memory.&lt;br /&gt;&lt;br /&gt;Still I thought this exam was great. I like the 48 hour nature of the exam, as well as the multiple sections and environments. This kept it fresh, if I got bored or stuck in one area it was easy to pivot and keep solving challenges. I also appreciated that the exam didn’t artificially gate progress behind single points of failure. My bottom line on this is that the exam is solid for testing hands-on forensic competence across multiple domains. The labs and exam are well worth the time and cost, and the exam format is among the better designs I’ve seen for blue-team certifications.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/s6600/CCD.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;5100&quot; data-original-width=&quot;6600&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/w400-h309/CCD.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/7693205593225584757/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7693205593225584757' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7693205593225584757'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7693205593225584757'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender_30.html' title='Course Review: Certified CyberDefender (CCD)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/s72-w400-h309-c/CCD.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7966825381811647833</id><published>2025-12-17T08:03:00.000-08:00</published><updated>2025-12-17T08:03:44.379-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="planning"/><category scheme="http://www.blogger.com/atom/ns#" term="strategy"/><title type='text'>Book Review: &quot;Good Strategy / Bad Strategy&quot;`</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/s1000/good_bad_strategy.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;658&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/w264-h400/good_bad_strategy.jpg&quot; width=&quot;264&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Good Strategy / Bad Strategy&quot; by Richard Rumelt is one of the clearest distinctions on what strategy is not that I&#39;ve encountered. Its very illuminating for anyone caught in melancholy of normal corporate planning cycles. It&#39;s a very solid book on how to avoid bad strategy or what the difference is beyond just goal setting. This book attempts to answer how we carve real strategy out of our strengths and opportunities. It tries to take on the challenge of how we get an advantage when accomplishing our goals. One of the classic pitfalls in planning is simply setting forth a dog&#39;s dinner in terms of objectives that are hard to hit and don&#39;t lend themselves to any type of advantage in that work. I listened to the book on Audible for over 10 hours at essentially $15 or 1 credit. Overall I give it 6 out of 10 stars, for being eye-opening but ultimately lacking to build a clear path out of it&#39;s own problem statement. I recommend it to anyone involved in strategic planning or planning in general as I think it is valuable recognizing bad strategy at play. Despite my criticisms that the book doesn&#39;t help prepare a strategy, knowing what not to do actually greatly improves the planning process. The book really succeeds in sharpening your strategic eye. Even if it doesn&#39;t lay out a methodical process for carving out strategy, it does make you question the effectiveness and strategy of your methods, forcing you to re-evaluate until you land at a better place. In that sense, it really lends itself to red teaming your strategy, looking at it from multiple perspectives and finding both advantages and weakness in the approach. In my typical style, the following are the chapters of the book:&lt;br /&gt;&lt;br /&gt;Introduction: Overwhelming Obstacles&lt;br /&gt;&lt;b&gt;Part I: Good and Bad Strategy&lt;/b&gt;&lt;br /&gt;Chapter 1: Good Strategy is Unexpected&lt;br /&gt;Chapter 2: Discovering Power&lt;br /&gt;Chapter 3: Bad Strategy&lt;br /&gt;Chapter 4: Why So Much Bad Strategy?&lt;br /&gt;Chapter 5: The Kernel of Good Strategy&lt;br /&gt;&lt;b&gt;Part II: Sources of Power&lt;/b&gt;&lt;br /&gt;Chapter 6: Using Leverage&lt;br /&gt;Chapter 7: Proximate Objectives&lt;br /&gt;Chapter 8: Chain-Link Systems&lt;br /&gt;Chapter 9: Using Design&lt;br /&gt;Chapter 10: Focus&lt;br /&gt;Chapter 11: Growth&lt;br /&gt;Chapter 12: Using Advantage&lt;br /&gt;Chapter 13: Using Dynamics&lt;br /&gt;Chapter 14: Inertia and Entropy&lt;br /&gt;Chapter 15: Putting it Together&lt;br /&gt;&lt;b&gt;Part III: Thinking Like a Strategist&lt;/b&gt;&lt;br /&gt;Chapter 16: The Science of Strategy&lt;br /&gt;Chapter 17: Using Your Head&lt;br /&gt;Chapter 18: Keeping Your Head&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The book shows a lot of anecdotal examples of strategies that don&#39;t work. The book is big on calling out the misnomer that strategies have been set or applied when in reality there is no actual overarching strategy. The book talks about the active planning cycle and setting conscious thought into how to go about thinking or planning not just accomplishing the goals. I actually thought this was a little too anecdotal. I would have preferred a more repeatable approach to carving out strategies from planning routines. I would have preferred tips and tricks to analyzing a situation for an an advantage, perhaps some principles that could be leveraged in the planning process to better one those muscles or efforts. The book showed me a lot of what not to do, but left me wanting in terms of how to actually plan and formulate an advantage in a scientific way. Ultimately, the book showed more of what not to do, rather than what to do, which still had a ton of value in terms of planning. While the book also anecdotally mentions some entrepreneurs who found great strategic success in iterating or experimenting on their ideas, the book also downplays these motions as a tactic for refining and battle-testing a strategy. The role of experimentation, iteration, and feedback loops can&#39;t be understated in domains that require strategy to win. Further, there is often an adversarial component involved in domains where strategy matters more than an engineering plan. In those environment especially it is important to make sure your strategy remains dynamic and adaptable to environmental or situational feedback. If something works or stops working listening to that feedback can be some of your biggest strategic advantage in some environments.&amp;nbsp;&amp;nbsp;The following is Richard discussing strategy on a podcast. Some of the concepts in the interview come from his newer books, but the interview is great so enjoy!&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/4uWKEG0s9Kc?si=1JxUVZd0Eshns_GC&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/7966825381811647833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7966825381811647833' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7966825381811647833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7966825381811647833'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/12/book-review-good-strategy-bad-strategy.html' title='Book Review: &quot;Good Strategy / Bad Strategy&quot;`'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/s72-w264-h400-c/good_bad_strategy.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-781889623762691737</id><published>2025-12-03T11:50:00.000-08:00</published><updated>2025-12-17T07:59:07.266-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blue team"/><category scheme="http://www.blogger.com/atom/ns#" term="certified CyberDefender"/><category scheme="http://www.blogger.com/atom/ns#" term="course review"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Defense"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><title type='text'>Course Review: Certified CyberDefender - Incident Response Optional Module</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/s345/Certified_CyberDefender.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;345&quot; data-original-width=&quot;294&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/w341-h400/Certified_CyberDefender.png&quot; width=&quot;341&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This review is only for the Incident Response module within the &lt;a href=&quot;https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/&quot;&gt;Certified CyberDefender course and labs&lt;/a&gt;. I plan on doing a full review of the course and certification after I take I sit for the test, but in the mean-time this a review of just the Incident Response Module, in the Optional Modules section. To be honest, this module is why I purchased the course in the first place, as I was looking for an Incident Response primer to roll out to my teams at work. TL;DR this specific module is not great, there is a lot that seems contrary to common cyber security advice, which I break down briefly in this review. While this entire training may prepare a SOC analyst for their day job, I wouldn&#39;t say this IR module would prepare someone for an actual Incident Response. To be honest, I found the incident response module very lacking, both wrong on several traditional definitions, as well as not as focused in terms of tradecraft, as I would like to see. As a result I am writing my own training for the team in conjunction with several industry peers, but i wanted to call out several of the reasons I wouldn&#39;t use this module as a formal training.&amp;nbsp; Lets start w/ some of the most egregious examples of getting traditional definitions wrong. Very early on in module they have a formula for Risk that seems very wrong.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;They state:&amp;nbsp;&lt;br /&gt;Risk = Threat x Vulnerability&lt;br /&gt;However the traditional equation from the field of Risk Analysis is:&lt;br /&gt;Risk = Likelihood x Impact&lt;br /&gt;&lt;br /&gt;It&#39;s a very weird definition to change even if they explain it their terms. By changing these definitions it risks training a new set of people on different definitions for no apparent reason. And this isn&#39;t a definition of risk that the security industry made up either, this was a formula that the security industry adopted from financial risk actuaries, so using security specific terms like threat and vulnerability really make less sense in that context.&amp;nbsp;Similarly when they break down the traditional three prime locations to do modern detection and log aggregation, they give four locations. The fourth domain comes from calling one area &#39;systems telemetry&#39; and another &#39;edge systems telemetry&#39;, seemingly drawing the distinction between internal network telemetry and the edge network analysis. I think this is a weird distinction to make and especially trivial in the context of an incident response effort, beyond maybe finding the root compromise. Further, when we do edge security analysis it often isn&#39;t traffic analysis such as netflow or pcap, it&#39;s typically application logs or en-mass observability statistics. In general the module puts a large focus on network analysis, which includes some really good labs, using tools such as Suricata, Zeek, Velocialraptor, and RITA. These are great and powerful tools for real network analysis and automated detection, although modern incident response has shifted to largely using EDR solutions and some kind of unified identity log collection. I would have really liked to see more tradecraft around tracking an incident, documented compromised hosts, and using this to fight an active infection. A bigger focus on reporting in general could be helpful as incidents often coincide with breaches and understanding the difference is often critical to an incident responders job. The layout of the content is also unclear and generally confusing. The website tries to break the module up by &quot;phases&quot; of the IR lifecycle, only chunked together. This would work if it stayed to it&#39;s own self defined phases, such as:&lt;br /&gt;&lt;br /&gt;Phase 1: Preparation&lt;br /&gt;Phase 2: Detection and Analysis&lt;br /&gt;Phase 3: Containment, Eradication, and Recovery&lt;br /&gt;Phase 4: Post-Incident Activity&lt;/p&gt;&lt;p&gt;But instead it jumps all around these topics, having random sections such as &quot;Remediation / Eradication&quot; and &#39;Restore, Validate, and Monitor&quot; in the middle of the previous phases, staying neither consistent in the naming nor the layout. The resulting module layout muddles the IR life cycle, how the engagement should proceed, and when to move between phases or apply different strategy. Finally the quizs are pretty simple for the IR module specific content, each 
quiz simply consists of 3 questions which you can challenge any number 
of times, making it an easy thing to blast through. That said, I can 
understand how the real test is supposed to be the certification exam, 
but seeing as how this is an optional module it would be nice to see 
real tests associated with this content. All that said, check back in as I challenge the certification and post a full review of the course. &lt;a href=&quot;https://theunsaltedcyberblog.medium.com/certified-cyberdefenders-ccd-2025-review-hands-on-blue-team-certification-for-dfir-soc-2832d2d1cdb3&quot;&gt;This other review&lt;/a&gt; I&#39;ve read says the course isn&#39;t for beginners and was rather difficult, but I&#39;ve actually found it great for those moving from novice with solid background into a SOC analyst role specifically. Check back soon!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/781889623762691737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/781889623762691737' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/781889623762691737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/781889623762691737'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender.html' title='Course Review: Certified CyberDefender - Incident Response Optional Module'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/s72-w341-h400-c/Certified_CyberDefender.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8163569692260388670</id><published>2025-11-16T07:43:00.000-08:00</published><updated>2025-11-18T12:16:40.940-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="realistic"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="table top"/><title type='text'>Book Review: &quot;Cybersecurity Tabletop Execercises&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/s1000/tabletops.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;756&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/w303-h400/tabletops.jpg&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Cybersecurity Tabletop Exercises: From Planning to Execution&quot; by Robert Lelewski and John Hollenberger was an interesting book that I picked up at Ada&#39;s Technical Books in Seattle. Granted, I do a lot of table top exercises, at least four annually, so this is subject matter I know pretty well. Still I wanted to make sure I wasn&#39;t missing some big or new thing.&amp;nbsp;I paid &lt;a href=&quot;https://www.amazon.com/Cybersecurity-Tabletop-Exercises-Planning-Execution/dp/1718503822&quot;&gt;over $60 for this book new&lt;/a&gt; at only 150 pages, which feels pricey. My default pricing for books is typically $10 per 100 pages with lots of flexibility depending on the subject matter and presentation. Overall I give this 5 out of 10 stars. Frankly, I think it was overpriced and didn&#39;t offer any groundbreaking insights. There are also dozens of free resources from the &lt;a href=&quot;https://ttx.epa.gov/learn.html&quot;&gt;EPA&lt;/a&gt; to &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/2%20-%20CTEP%20Exercise%20Planner%20Handbook%20%282020%29%20FINAL_508_1.pdf&quot;&gt;CISA&lt;/a&gt; to a million easily digestible &lt;a href=&quot;https://www.alertmedia.com/blog/tabletop-exercises/&quot;&gt;blog posts&lt;/a&gt; that cover the same material, so the high sticker price really was a shocker to get that same content. The book is laid out such that the main book (Part 1) is really only about 100 pages of theory (and that feels like stretching it) and the following 50 pages (Part 2) are multiple examples and sample tabletop exercises. If you were mega tight on timing I could actually see grabbing this book for these canned scenarios. That said, there are also &lt;a href=&quot;https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages&quot;&gt;dozens&lt;/a&gt; of &lt;a href=&quot;https://www.cisecurity.org/insights/white-papers/six-tabletop-exercises-prepare-cybersecurity-team&quot;&gt;free table top exercises&lt;/a&gt; on the Internet.&amp;nbsp;The theory is also a bit light, as stated, you could learn much of this for free on the Internet. The following is the chapters of the book:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Part 1: The Tabletop Exercise Process&lt;br /&gt;&lt;/b&gt;Chapter 1: Why Perform Tabletop Exercises?&lt;br /&gt;Chapter 2: Planning the Tabletop Exercise&lt;br /&gt;Chapter 3: The Development Process: Where the Rubber Meets the Road&lt;br /&gt;Chapter 4: Facilitating a Successful Tabletop Exercise&lt;br /&gt;Chapter 5: Acting on What You&#39;ve Learned: Evaluation and Next Steps&lt;br /&gt;&lt;b&gt;PART II: Example Scenarios&lt;br /&gt;&lt;/b&gt;Chapter 6: Engaging a Technical Audience&lt;br /&gt;Chapter 7: Engaging a Executive Audience&lt;br /&gt;Chapter 8: Engaging the Business&lt;br /&gt;Appendix: Reporting Templates&lt;/p&gt;&lt;p&gt;Despite those previously mentioned shortcomings, the book does highlight a few things I think are worth calling out. I think having the non-static, multiple injects per tabletop example was neat. My tabletops often follow phases of the IR life cycle, whereas having the arbitrary injects move the plot could change that pace and add more dynamic content. It&#39;s also a little more realistic this way and mixes things up. I also really liked the emphasis on choosing and fitting the exercise to the audience. Such as having specific exercises target technical or non-technical audiences. The book also did well getting planners to estimate modes of participation, brainstorming how to generate more audience participation, and estimating some of the expected outcomes. I also think the postmortems on the exercise itself are a critical step and I&#39;m glad the text calls that out. It&#39;s important to extract the lessons learned into actionable tasks to be accomplished otherwise the exercise could be in vain (beyond the teamwork and educational opportunities from the exercise itself). The following is an random youtube video on how to run your own table top exercises if you are interested, it is generally unrelated to the book:&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/1XK_dZkb9Kw?si=20IqkVbqGHEUH7-H&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/8163569692260388670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8163569692260388670' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8163569692260388670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8163569692260388670'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/11/book-review-cybersecurity-tabletop.html' title='Book Review: &quot;Cybersecurity Tabletop Execercises&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/s72-w303-h400-c/tabletops.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4126291409923878677</id><published>2025-11-14T14:00:00.000-08:00</published><updated>2025-11-18T11:51:23.680-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="coaching"/><category scheme="http://www.blogger.com/atom/ns#" term="communication"/><category scheme="http://www.blogger.com/atom/ns#" term="executive"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><title type='text'>Book Review: &quot;Conversational Intelligence&quot;</title><content type='html'>&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/s1000/convo_intel.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;966&quot; data-original-width=&quot;1000&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/w400-h386/convo_intel.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Conversational Intelligence: How Great Leaders Build Trust and Get Extraordinary Results&quot; by Judith Glaser was a fairly decent book on building world class communication skills and thus interpersonal relationships. This was a fairly simple book that outlined how most corporate teams fail to communicate by issuing orders to one another and how to move toward conversations that view all parties as collaborators. I think the book is fairly thin in terms of actual stratagies to do this, and the author seemingly recreates a lot of existing theories and paradigms, without really referencing those existing structures.&amp;nbsp;This was a cheap and very reasonably priced book &lt;a href=&quot;https://www.amazon.com/Conversational-Intelligence-Leaders-Extraordinary-Results/dp/1629561436&quot;&gt;at $10 for 200 pages&lt;/a&gt;. And 
this was a mega quick read, I finished it easily under 6 hours.&amp;nbsp;&amp;nbsp;Overall I give this 5 out of 10 stars, as I think there are better ways to convey what the author is getting at. Overall I would probably recommend other leadership books unless you are specially suffering from bad communications skills and plagued by poor conversations. Don&#39;t get me wrong, I think there are good and important lessons here. Communicating at level three as she describes it, is critical I think to good interpersonal communication. But I also think the author makes up so many new terms, such as &quot;double clicking&quot; that it actually confuses their point when they could just describe the actual phenomenon more clearly. Further, &lt;a href=&quot;https://thorprojects.com/2017/06/26/book-review-conversational-intelligence-great-leaders-build-trust-get-extraordinary-results/&quot;&gt;other reviews have called out how the author seemingly bites&lt;/a&gt; other concepts without ever actually referencing the original materials. I got this vibe throughout the entire book and it was a really big turn off. For example she coins her own term and thus the title of the book as Conversational-Intelligence (C-IQ), as a play on the traditional Intelligence Quota (IQ) or the newer Emotional Intelligence (EQ). The problem is that her newly coined Conversational Intelligence is what most people have generally accepted as Emotional Intelligence (understanding others, their communication styles, and thus goals), yet I have never heard another use the phrase conversational intelligence in it&#39;s place, before this book. By redefining already accepted concepts to make them your own, without really adding anything new to the concepts you only serve to confuse the topic rather than clarify it.&amp;nbsp;The book is split into 3 parts, in my normal style here at the chapters of the book:&lt;/p&gt;&lt;p&gt;Introduction: Discovering a New Intelligence&lt;br /&gt;&lt;b&gt;Part I: Conversational Intelligence and Why We Need It&lt;br /&gt;&lt;/b&gt;Chapter 1: What We Can Learn from Our Worst Conversations&lt;br /&gt;Chapter 2: When We Lose Trust, We Lose Our Voice&lt;br /&gt;Chapter 3: Moving from Distrust to Trust&lt;br /&gt;&lt;b&gt;Part II: Raising Your Conversational Intelligence&lt;br /&gt;&lt;/b&gt;Chapter 4: Challenges of Navigating the Conversational Highway&lt;br /&gt;Chapter 5: Harvesting Conversational Intelligence Using the Wisdom of our Five Brains&lt;br /&gt;Chapter 6: Bringing Conversation to Life&lt;br /&gt;Chapter 7: Priming for Level III Conversations&lt;br /&gt;Chapter 8: Conversational Agility: Reframing, Refocusing, Redirecting&lt;br /&gt;Chapter 9: A Toolkit for Level III Conversations&lt;br /&gt;&lt;b&gt;Part III: Getting to the Next Level of Greatness&lt;br /&gt;&lt;/b&gt;Chapter 10: Leading with Trust: Laying the Foundation for Level III Interactions&lt;br /&gt;Chapter 11: Teaming Up Through Conversational Intelligence&lt;br /&gt;Chapter 12: Changing the Game Through Conversational Intelligence&lt;br /&gt;Epilogue: Creating Conversations That Change The World&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;As much as I think there are good, important lessons here around building trust and communication with your peers, many of the author&#39;s techniques in communicating how and why that is important, really rubbed me the wrong way. For example, the chapter on &quot;the five brains&quot; talks about fairly pseudo-science ideas that we have these oversimplified parts of our brain that evolved out of lizard brains. That combined with the advice that one must &quot;work on their third eye&quot; in order to improve conversations with people, just came off as hippie nonsense to me. The end notes and references are also extremely thin, mostly only referencing a few of &lt;a href=&quot;https://www.sciencefocus.com/the-human-body/the-lizard-brain-lie&quot;&gt;these weird debunked brain theories&lt;/a&gt;. Further, where she should be citing other works in the field and ideas she&#39;s borrowed, she uses multiple pages to thank CEOs who were her clients at various points in time. It feels very self-serving and like a weird shout-out as opposed to actual acknowledgments of other work in the field. Beyond that criticism, I think the book could have done more to describe different modes of 
communication that scale differently and thus lend themselves to 
different types of corporate &quot;conversations&quot;. The book is obviously pitched at improving work conversations, not all work conversations are equivalent, one on ones, or direct conversations. I would have liked to see more examples on what kind of &quot;conversation&quot; 
is an all-hands, and how can you open that up or best engage audiences 
at these levels of scale, not just in a single conversation or a small 
group setting. I think giving the readers more tools to have and improve these conversations could be genuinely really helpful in a book like this.&amp;nbsp;That said, the book is easy to read 
and includes dozens of simple graphs and graphics, or nice images that 
emphasize the points and break up the normal text. Feedback on this book is all across the board, but there are certainly some people that think similar to I on amazon reviews. That said, this is also a best seller and massively popular, so don&#39;t let me dissuade you, a lot of people really like it!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/4126291409923878677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4126291409923878677' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4126291409923878677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4126291409923878677'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/11/book-review-conversational-intelligence.html' title='Book Review: &quot;Conversational Intelligence&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/s72-w400-h386-c/convo_intel.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6515709305450475984</id><published>2025-11-05T15:09:00.000-08:00</published><updated>2025-11-05T15:09:46.946-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Marshall Goldsmith"/><category scheme="http://www.blogger.com/atom/ns#" term="WGYHWGYT"/><category scheme="http://www.blogger.com/atom/ns#" term="what got you here won&#39;t get you there"/><title type='text'>Book Review: &quot;What Got You Here, Won&#39;t Get You There&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/s500/WGYHWGYT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;500&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/w400-h400/WGYHWGYT.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;What Got You Here Won&#39;t Get You There: How Successful People Become Even More Successful&quot; by Marshall Goldsmith is a great book on evolving your leadership and management approach. It&#39;s a self help book that aims on personal improvement through various methods of corporate feedback. The book is straightforward, anecdotal, and practical. It focuses on first breaking down the ego and understanding that all of us, no matter how successful we are, can still find things to improve and work on in our life. The book really hammers home how success can get in our way, blinding us to our own shortcomings, or creating excuses for our behavior that is still holding us back, despite our own success. One of the really cool things about Marshall is that he publishes all of &lt;a href=&quot;https://www.marshallgoldsmith.com/blog&quot;&gt;his resources &lt;/a&gt;for free on his personal website, including &lt;a href=&quot;https://marshallgoldsmith.ai/chat&quot;&gt;a really neat LLM&lt;/a&gt; trained on his advice! I personally listened to the &lt;a href=&quot;https://www.amazon.com/What-Got-Here-Wont-There/dp/B000MGBNGW/&quot;&gt;book on audible&lt;/a&gt; for roughly ~8 hours (at 1.5 speed) for less than $1. I found it highly enlightening and generally good use of my time. Overall I give the book 6 out of 10 stars, as it didn&#39;t really say anything too novel or that I haven&#39;t heard before in terms of leadership coaching, however they are still critical lessons for any person, especially those who are already successful, to hear (again). I recommenced this book to anyone in a corporate setting, I firmly believe we all have features we can improve within ourselves and that recognizing that and setting up a plan for achieving it is within everyone&#39;s locus of control. In my typical style, here are the chapters of the book:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Section One: The Trouble with Success&lt;/b&gt;&lt;br /&gt;Chapter 1: You Are Here&lt;br /&gt;Chapter 2: Enough About You&lt;br /&gt;Chapter 3: The Success Delusion, or Why We Resist Change&lt;br /&gt;&lt;b&gt;Section Two: The Twenty Habits That Hold You Back from the Top&lt;/b&gt;&lt;br /&gt;Chapter 4: The Twenty Habits&lt;br /&gt;Chapter 5: The Twenty-First Habit: Goal Obsession&lt;br /&gt;&lt;b&gt;Section Three: How We Can Change for the Better&lt;/b&gt;&lt;br /&gt;Chapter 6: Feedback&lt;br /&gt;Chapter 7: Apologizing&lt;br /&gt;Chapter 8: Telling the World, or Advertising&lt;br /&gt;Chapter 9: Listening&amp;nbsp;&lt;br /&gt;Chapter 10: Thanking&lt;br /&gt;Chapter 11: Following Up&lt;br /&gt;Chapter 12:Practicing Feedforward&lt;br /&gt;&lt;b&gt;Section Four: Pull Out the Stops&lt;/b&gt;&lt;br /&gt;Chapter 13: Changing The Rules&lt;br /&gt;Chapter 14: Special Challenges for People in Charge&amp;nbsp;&lt;/p&gt;&lt;p&gt;Some of the major themes I want to highlight from the book are as follows. Successful people often fall into what Marshall calls &quot;success traps&quot;. What works early in a career (drive and competitiveness) becomes a liability at later levels or in different positions. Its important to not make excuses for our bad traits because we&#39;ve been successful despite them. Practice &quot;feedforward&quot;, not feedback. This is incredibly important when providing people input on their work. Don&#39;t diminish it or shoot it down by using negative language, rather focus on what to do next time or how to course correct going forward Perception is reality is a huge message. How others perceive your behavior defines your effectiveness as a leader, not how you perceive yourself. It&#39;s important to square your own assumptions with your external perception using peer feedback. Finally, interpersonal change is measurable. You can and should track progress in interpersonal behavior with regular check-ins and metric like systems, just as you would a technical program.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Marshall makes a point of listing out 20 bad habits that can doom a career, I&#39;de like to list them for readers below:&lt;/p&gt;&lt;p&gt;&amp;nbsp;1. Winning too much: The need to win at all costs and in all situations.&lt;br /&gt;&amp;nbsp;2. Adding too much value: The overwhelming desire to add our 2 cents to every discussion.&lt;br /&gt;&amp;nbsp;3. Passing judgment: The need to rate others and impose our standards on them.&lt;br /&gt;&amp;nbsp;4. Making destructive comments: The needless sarcasm and cutting remarks that we think make us witty.&lt;br /&gt;&amp;nbsp;5. Starting with NO, BUT, HOWEVER: The overuse of these negative words which&amp;nbsp; say to others that you’re wrong.&lt;br /&gt;&amp;nbsp;6. Telling the world how smart we are: The need to show people we’re smarter than they think we are.&lt;br /&gt;&amp;nbsp;7. Speaking when angry: Using emotional volatility as a management tool.&lt;br /&gt;&amp;nbsp;8. Negativity, or “that won’t work”: The need to share our negative thoughts even when we weren’t asked.&lt;br /&gt;&amp;nbsp;9. Withholding information: The refusal to share information in order to maintain an advantage over others.&lt;br /&gt;&amp;nbsp;10. Failing to give proper recognition: The inability to give praise and reward.&lt;br /&gt;&amp;nbsp;11. Claiming credit that that we don’t deserve: The most annoying way to overestimate our contribution to any success.&lt;br /&gt;&amp;nbsp;12. Making excuses: The need to reposition our annoying behavior as a permanent fixture so people excuse us for it.&lt;br /&gt;&amp;nbsp;13. Clinging to the past: To deflect blame away from ourselves and onto events and people from our past.&lt;br /&gt;&amp;nbsp;14. Playing favorites: Failing to see that we are treating someone unfairly.&lt;br /&gt;&amp;nbsp;15. Refusing to express regret: The inability to take responsibility for our actions.&lt;br /&gt;&amp;nbsp;16. Not listening: The most passive-aggressive form of disrespect for colleagues.&lt;br /&gt;&amp;nbsp;17. Failing to express gratitude: The most basic form of bad manners.&lt;br /&gt;&amp;nbsp;18. Punishing the messenger: The misguided need to attack the innocent who are informing us.&lt;br /&gt;&amp;nbsp;19. Passing the buck: The need to blame everyone but ourselves.&lt;br /&gt;&amp;nbsp;20. An excessive need to be “me”: Exalting our faults as virtues simply because they’re who we are.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Below you can see Marshall speaking at Google on some of the lessons in the book. It&#39;s an extremely interactive session with breaks in the middle where he asks the audience to engage in some exercises. You should skip around those parts as you watch at home:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/3WBeGAAYWg8?si=IF0kNX0_k1z7-V2D&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/6515709305450475984/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6515709305450475984' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6515709305450475984'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6515709305450475984'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/11/book-review-what-got-you-here-wont-get.html' title='Book Review: &quot;What Got You Here, Won&#39;t Get You There&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/s72-w400-h400-c/WGYHWGYT.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7199274196635692537</id><published>2025-10-25T13:58:00.000-07:00</published><updated>2025-10-25T13:58:36.854-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="andrew grove"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="high output management"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="team building"/><title type='text'>Book Review: &quot;High Output Management&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/s1000/high_output_management.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;648&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/w259-h400/high_output_management.jpg&quot; width=&quot;259&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;High Output Management&quot; by Andrew S Grove was a great book on various management strategies and lessons learned from Andy Grove scaling his career and business at Intel. The book is all about how managers can maximize their output, and thus the output of their team. It&#39;s all about where managers should be spending their time and what investments provide long term value in terms of company and employee growth. I think the book really resonated with me because there is such a focus on education and how a manager should really act as a guide and a teacher.&amp;nbsp;Overall I give this a 6 out of 10 book in my journey of learning better management and leadership strategies.&amp;nbsp; I recommend this book to those who still don&#39;t believe in the power of 1 on 1s or want help managing large teams across multiple organizations. I really like how the book talks about a manger&#39;s primary role being that of information flow and circulation, such that they are constantly communicating important task level information downward, project level information horizontally, and progress on goals upward. A large part of that communication is receiving information and understanding what the different aspects of the business are doing, to be able to translate it effectively to different audiences. There are several practical tools in this book that managers can implement immediately to become better at their jobs. In my typical format, here are the chapters in the book:&lt;/p&gt;&lt;p&gt;Introduction&lt;br /&gt;&lt;b&gt;Part I: The Breakfast Factory&lt;/b&gt;&lt;br /&gt;Chapter 1: The Basics of Production: Delivering a Breakfast&lt;br /&gt;Chapter 2: Managing the Breakfast Factory&lt;br /&gt;&lt;b&gt;Part II: Management Is a Team Game&lt;/b&gt;&lt;br /&gt;Chapter 3: Managerial Leverage&lt;br /&gt;Chapter 4: Meetings: The Medium of Managerial Work&lt;br /&gt;Chapter 5: Decisions, Decisions&lt;br /&gt;Chapter 6: Planning: Today&#39;s Actions for Tomorrow&#39;s Output&lt;br /&gt;&lt;b&gt;Part III: Team of Teams&lt;/b&gt;&lt;br /&gt;Chapter 7: The Breakfast Factory Goes National&lt;br /&gt;Chapter 8: Hybrid Organizations&lt;br /&gt;Chapter 9: Dual Reporting&lt;br /&gt;Chapter 10: Modes of Control&lt;br /&gt;&lt;b&gt;Part IV: The Players&lt;/b&gt;&lt;br /&gt;Chapter 11: The Sports Analogy&lt;br /&gt;Chapter 12: Task-Relevant Maturity&lt;br /&gt;Chapter 13: Performance Appraisal: Manager as Judge and Jury&lt;br /&gt;Chapter 14: Two Difficult Tasks&lt;br /&gt;Chapter 15: Compensation as Task-Relevant Feedback&lt;br /&gt;Chapter 16: Why Training Is the Boss&#39;s Job&lt;br /&gt;&lt;b&gt;One More Thing...&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;There are a few tools and themes that I found especially helpful from the book, such as tickler files, 1 on 1s, office hours, group decision making, matrix management, and task relevance maturity.&amp;nbsp;I really like the idea of using tickler files as reminder files or note files. I personally set mine up as google calendar dates, with either advanced notice or just as informational popups. I also like them when dealing with all of the intricacies of various team work and interpersonal issues. Especially coupled with 1 on 1s, to track and address employee issues, tickler files can be especially useful to establish early and maintain as a way of generating talking points, saving important notes, or just reaching out for something. I&#39;ve already talked about them in depth in other management book reviews, but 1 on 1s are a powerful tool for hearing employees as individuals, solving their direct problems, and providing valuable information about the job. Something new I got from this book was the idea of office hours to decrease short to medium-term interruptions by setting a dedicated time for them. The book also talks about career management and planning your career consciously, not only for yourself but helping your direct reports plan their career in their best interests. One really fascinating concept I got from this book around career growth, especially in terms of moving into management was the idea of &#39;task relevant maturity&#39;. This is the idea that someone may be a great manager in a subject they are very familiar with, but a poor manager in another area where they are less familiar. This is important to consider as your role grows and changes throughout your career. Lastly, I really like the idea of matrix management for large projects, or the idea that multiple people can oversee different parts of a team, and employees are beholden to multiple stakeholders or managers in delivering these large work streams. Other ways to accomplish this for specific projects are RACI charts, but the concept of matrix management alone is powerful for larger teams and organizations.&amp;nbsp;The following is a video series by Abi Tyas Tunggal on the book where he breaks the lessons from the book down into several short video lectures, it&#39;s really fantastic stuff:&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/xnjByFtiN7Q?si=Zy7R21Mw0ZxNmImE&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/7199274196635692537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7199274196635692537' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7199274196635692537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7199274196635692537'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/10/book-review-high-output-management.html' title='Book Review: &quot;High Output Management&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/s72-w259-h400-c/high_output_management.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-5622509607366439541</id><published>2025-10-13T00:58:00.000-07:00</published><updated>2025-10-13T00:58:18.571-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blog Response"/><category scheme="http://www.blogger.com/atom/ns#" term="David Campbell"/><category scheme="http://www.blogger.com/atom/ns#" term="Dcam"/><category scheme="http://www.blogger.com/atom/ns#" term="Engineering Cliff"/><title type='text'>Bridging the Coming Engineering Cliff (Brainstorming Solutions for DCam&#39;s &quot;The Coming Engineering Cliff&quot;)</title><content type='html'>&lt;p&gt;David Campbell raises a valid concern: are we facing a looming engineering talent pipeline problem? His piece, &lt;a href=&quot;https://generativeai.pub/the-coming-engineering-cliff-5f961c432c56&quot;&gt;The Coming Engineering Cliff&lt;/a&gt;, paints a picture of AI rapidly encroaching on the territory of a proper computer science education. While the allure of AI-powered development is undeniable, we must not lose a critical element in the development of jr engineers: the irreplaceable value of hard-won experience, the kind forged in the fires of scaling nightmares and security incidents. This isn&#39;t about AI vs. engineers; it&#39;s about ensuring the next generation doesn&#39;t just trade depth for velocity while building skills.&lt;br /&gt;&lt;br /&gt;Campbell&#39;s argument hinges on AI&#39;s ability to automate and accelerate development. Fair enough. But engineering isn&#39;t just about churning out code; it&#39;s about understanding the underlying systems, anticipating failure modes, and crafting solutions that are both thoughtful and robust. This instinct isn&#39;t something you can simply train a LLM on. Instinct comes from going through a production outage at 3 AM, from tracing a memory leak through a million lines of code, from learning, often painfully, what not to do. It&#39;s about recognizing patterns not just statistically, but viscerally. It&#39;s the difference between knowing the rules of chess and being able to anticipate your opponent&#39;s strategy. In many ways it can be adversarial thinking, but applied to your own systems. LLMs excel at pattern matching. They can regurgitate solutions based on past incidents. But what happens when faced with a novel threat, a zero-day exploit, a scaling challenge no one has ever encountered before? That&#39;s where the A+ engineer, the one with the battle scars and the finely honed instincts, steps in. They don&#39;t just apply a prepackaged solution; they invent one that suits the need at hand.&lt;br /&gt;&lt;br /&gt;Cloud platforms and AI-powered tools promise to abstract away the complexities of infrastructure and security. And in many ways, they deliver. But this abstraction comes at a cost. Younger engineers, raised on these platforms, are increasingly shielded from the &#39;unforgiving edge of scale&#39;, as Campbell aptly puts it. They can deploy applications with a few clicks, without ever grappling with the intricacies of load balancing, network security, or database optimization, as examples. They become vibe coders, deploying code they barely understand, hoping for the best. This isn&#39;t to say these tools are inherently bad; they&#39;re incredibly powerful if used by engineers who possess a solid foundation of knowledge. The problem is that these platforms can become a crutch, preventing younger engineers from developing the deep understanding necessary to troubleshoot complex issues and design resilient systems. They&#39;re learning to drive without ever understanding how the engine works. And when the engine inevitably breaks down, they&#39;re left stranded.&lt;br /&gt;&lt;br /&gt;The core issue here is understanding why. A LLM trained on incident postmortems can identify potential failure points, but does it truly understand the underlying causes? Can it reason about nuanced trade-offs in a high-pressure situation? I&#39;m reminded of the Chinese Room argument: the AI can manipulate symbols according to rules, but it doesn&#39;t actually understand the meaning behind those symbols. This lack of understanding is particularly dangerous in security contexts. Trusting a non-deterministic black box that&#39;s prone to hallucinations to make critical security decisions is a recipe for disaster. We need engineers who can not only identify vulnerabilities but also understand the attacker&#39;s mindset, anticipate their moves, and design defenses that are both effective and adaptable. AI can augment human intelligence, but it can&#39;t replace it. We still need engineers who can think critically, creatively, and independently, who can challenge assumptions, and who can make informed decisions in the face of uncertainty.&lt;br /&gt;&lt;br /&gt;So, what&#39;s the solution? We can&#39;t simply abandon AI and cloud platforms; they&#39;re too valuable. Instead, we need to find ways to bridge the gap between abstraction and understanding, to cultivate the next generation of A+ engineers. Here are a few ideas:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Revive the apprenticeship model: Pair junior engineers with experienced mentors who can guide them through the complexities of real-world systems.&lt;/li&gt;&lt;li&gt;Create failure-friendly environments: Give engineers opportunities to experiment, to break things, and to learn from their mistakes in a safe and controlled setting. Think CTF environments where they must secure and scale vibe-coded programs.&lt;/li&gt;&lt;li&gt;Capture the wisdom of the elders: Document the experiences and insights of our most seasoned engineers before they retire or move on to other ventures. This means more senior engineers should blog or write about their hard gained experiences.&lt;/li&gt;&lt;li&gt;Integrate depth into the AI-assisted workflow: Design AI tools that not only automate tasks but also explain the underlying principles and trade-offs.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br /&gt;The goal isn&#39;t to eliminate AI, but to use it as a tool to enhance human intelligence, not to replace it. We need to create a culture that values depth of understanding, critical thinking, and the ability to adapt to unforeseen challenges. The coming engineering cliff isn&#39;t inevitable. But avoiding it requires a conscious effort to cultivate the next generation of A+ engineers, engineers who possess not only the technical skills but also the hard-won experience and the intuitive understanding necessary to navigate the complexities of the modern technological landscape. AI can be a powerful ally, but it&#39;s no substitute for human ingenuity. Let&#39;s not trade the wisdom of experience for the illusion of effortless automation. The future of engineering depends on it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/s1536/generative_work.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;1024&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/w426-h640/generative_work.png&quot; width=&quot;426&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/5622509607366439541/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/5622509607366439541' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5622509607366439541'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5622509607366439541'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/10/bridging-coming-engineering-cliff.html' title='Bridging the Coming Engineering Cliff (Brainstorming Solutions for DCam&#39;s &quot;The Coming Engineering Cliff&quot;)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/s72-w426-h640-c/generative_work.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-5324412422700474785</id><published>2025-08-31T10:29:00.000-07:00</published><updated>2025-08-31T11:26:37.579-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="Chinese Room Paradox"/><category scheme="http://www.blogger.com/atom/ns#" term="Justin Hutchens"/><category scheme="http://www.blogger.com/atom/ns#" term="Language of Deception"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><title type='text'>Book Review: &quot;The Language of Deception&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/s1000/the_language_of_deception.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;668&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/w268-h400/the_language_of_deception.jpg&quot; width=&quot;268&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;The Language of Deception: Weaponizing Next Generation AI&quot; By Justin Hutchens, takes an ambitious look at the intersection of social engineering, machine learning, and adversarial tradecraft. If you’re coming from a background in red teaming or threat intelligence, you’ll recognize many of the psychological and social principles, but what makes this book valuable is how it reframes those timeless tactics through the lens of AI for the general people. This book tries to warn people of the fallacy of the &quot;thinking machine&quot; or the idea that LLMs are intelligent or really considering ideas just because the output looks human. It&#39;s also a fantastic book on the history of AI, showing how these systems have evolved over time, and how models have been used throughout computer science. It&#39;s a long book around 400 pages, &lt;a href=&quot;https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/B0CRK5DQDR/ref=tmm_aud_swatch_0&quot;&gt;I listened to it on Audible&lt;/a&gt; at ~$15 for about 10.5 hours. I give it 6 out of 10 stars for being a great book on the risks of AI. Overall, I recommend the book to general technologists interested in AI as it lays out some stark realities with the tools, while not being too technical.&amp;nbsp;Although it was written in 2023, it feels like it was written awhile ago (because the space moves so fast) but still several of their predictions have come true. Hutchens doesn’t treat AI as magic. He systematically looks at how attackers could operationalize it, from mass-scale phishing to automated social-engineering campaign pretexting. The framing feels very much in line with how threat actors actually iterate on attack campaigns.&amp;nbsp;The following are the chapters of the book according to the Wiley website:&lt;br /&gt;&lt;br /&gt;Chapter 1: Artificial Social Intelligence&lt;br /&gt;Chapter 2: Social Engineering and Psychological Exploitation&lt;br /&gt;Chapter 3: A History of Technology and Social Engineering&lt;br /&gt;Chapter 4: A History of Language Modeling&amp;nbsp;&lt;br /&gt;Chapter 5: Consciousness, Sentience, and Understanding&lt;br /&gt;Chapter 6: The Imitation Game&lt;br /&gt;Chapter 7: Weaponizing Social Intelligence&lt;br /&gt;Chapter 8: Weaponizing Technical Intelligence&lt;br /&gt;Chapter 9: Multimodal Manipulation&lt;br /&gt;Chapter 10: The Future&lt;br /&gt;Chapter 11: The Quest for Resolution&lt;/p&gt;&lt;p&gt;Some parts feel a little disconnected from the reality of the technologies. For example around Chapter 7 the author is talking about bot automation and automated service interaction and discuses using the UI and web scraping to avoid bot detection, when in reality these techniques are pretty different from simply using the or scraping the user UI, and such actives are heavily logged and scrutinized for bot activity. I know it&#39;s a small nitpick but it shows a strange disconnect from the reality of some of the techniques. It&#39;s also a little wonky because the audio book counts the chapters differently than the print book, but I&#39;ve referenced the print chapters here. The book calls out one of the major threats my team repeatedly calls 
out, which is the illusion of intelligence in modern LLMs. Just because 
some it putting together a string of words that gives the illusion that 
it understands, doesn&#39;t mean the model has a true understanding of the 
content. This can cause users of these systems to place a false 
confidence in their output or misunderstand the tools entirely. Hutchens brilliantly demonstrates this with the &quot;&lt;a href=&quot;https://philosophyterms.com/chinese-room-paradox/&quot;&gt;Chinese Room Paradox&lt;/a&gt;&quot;, reminding us that convincing language isn’t evidence of comprehension. The following is an interview with Hutchens discussing the contents of the book:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/odf8RnQXgTU?si=vutVHcAdE5CpWxIr&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/5324412422700474785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/5324412422700474785' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5324412422700474785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5324412422700474785'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/08/book-review-language-of-deception.html' title='Book Review: &quot;The Language of Deception&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/s72-w268-h400-c/the_language_of_deception.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6174015134380788811</id><published>2025-08-27T17:34:00.000-07:00</published><updated>2025-09-08T00:12:08.344-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="def con"/><category scheme="http://www.blogger.com/atom/ns#" term="experience"/><category scheme="http://www.blogger.com/atom/ns#" term="GOON"/><category scheme="http://www.blogger.com/atom/ns#" term="volunteering"/><title type='text'>I Tried Gooning at DEF CON (Do Not)</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s376/defcon_police.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;376&quot; data-original-width=&quot;376&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s320/defcon_police.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;I recently volunteered as a DEF CON goon expecting to help people feel welcome and connected. Instead, I was let go for a minor infraction, an experience that left me concerned about how the culture of volunteering at DEF CON has shifted.&amp;nbsp;When volunteers give their time and money, they should be empowered to support attendees, not treated like replaceable enforcers. DEF CON thrives on community, but that only works if volunteering stays rooted in connection, not control. I don&#39;t want to name any specific people or leaders involved in this decision process, but as a long term volunteer for security events this just felt over the top to me. I will name the group, as this happened while I was volunteering for the NFO section of the goons (info goons), but to be frank I thought they would be the most open and least &quot;GOON&quot;-like group. The official reason I was let go was that I missed a call from my shift lead and was absent from a newly created shift location for 45 minutes. I thought I was activly doing my job by showing people the rooms, as I was engaged in helping DEF CON attendees find locations and people they were interested in the entire time. At the end of the day I&#39;m volunteering to make a more positive experience for others attending the thing. And I didn&#39;t do anything offensive or against the rules, I was just temporarily outside the control of a manager, and that was a terminal event. On top of that, I&#39;m a highly educated person who is often in leadership and managerial positions, so I understand feedback and coarse correction if I&#39;m not doing my job right. Firing me for being absent (due to a misinterpretation of what I thought I was supposed to be doing), is so absurd within a volunteer context that it really attributes itself to the over-zealous image of goons that the community has formed. Here are my major issues with the current culture of DEF CON goons:&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p data-end=&quot;1042&quot; data-start=&quot;835&quot;&gt;&lt;strong data-end=&quot;862&quot; data-start=&quot;835&quot;&gt;Authority &amp;amp; Power Trips&lt;/strong&gt;&amp;nbsp;- Certain goons come across like “mall cops,” more interested in enforcing rules than helping people. Some even brag about skipping lines or using their role for personal perks.&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1068&quot; data-start=&quot;1045&quot;&gt;Clique-ish Dynamics&lt;/strong&gt;&amp;nbsp;- It can feel like an insider’s club where newcomers aren’t welcomed. First-time volunteers often struggle to connect, while long-timers stick together.&lt;strong data-end=&quot;1249&quot; data-start=&quot;1226&quot;&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1249&quot; data-start=&quot;1226&quot;&gt;Status Over Service&lt;/strong&gt;&amp;nbsp;- The role can seem like a badge of superiority rather than a commitment to supporting attendees.&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1373&quot; data-start=&quot;1352&quot;&gt;Unapproachable&lt;/strong&gt;&amp;nbsp;- Groups of info goons often cluster together, making them intimidating and generally ineffective (They don&#39;t all answer questions when grouped like that, most of them stand around doing nothing). Attendees also report that simple questions often go unanswered&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Rules Over Hospitality&lt;/strong&gt;&amp;nbsp;- Instead of focusing on helping people, there’s a strong emphasis on enforcing arbitrary rules, which creates the impression that attendees are being policed rather than supported.&lt;/p&gt;Some perceive that goons enjoy status more than service, treating their role as a badge of superiority. I was very excited and eager to help people, but it felt like my shift lead was more eager to correct me or chastise me (For example I stopped in the hallway to give someone stickers, less than a minute activity, and I was chastised and told we had a five minute rule so I shouldn&#39;t be stopping and giving out things). Ultimately, I volunteered because I wanted to connect with people and make their DEF CON a more enriching experience. Being dismissed for trying to do that but not meeting some arbitrary rule left me questioning whether the culture around DEF CON goons has lost sight of its original and intended purpose. For further context on how DEF CON’s culture is shifting more broadly, this piece is worth a read:&amp;nbsp;&lt;a class=&quot;decorated-link&quot; data-end=&quot;2502&quot; data-start=&quot;2391&quot; href=&quot;https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;When Counterculture and Empire Merge&lt;/a&gt;&lt;a class=&quot;decorated-link&quot; data-end=&quot;2502&quot; data-start=&quot;2391&quot; href=&quot;https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge?utm_source=chatgpt.com&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;ms-0.5 inline-block align-middle leading-none&quot;&gt;&lt;svg class=&quot;block h-[0.75em] w-[0.75em] stroke-current stroke-[0.75]&quot; data-rtl-flip=&quot;&quot; fill=&quot;currentColor&quot; height=&quot;20&quot; viewbox=&quot;0 0 20 20&quot; width=&quot;20&quot; xmlns=&quot;http://www.w3.org/2000/svg&quot;&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/6174015134380788811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6174015134380788811' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6174015134380788811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6174015134380788811'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/09/i-tried-gooning-at-def-con-do-not.html' title='I Tried Gooning at DEF CON (Do Not)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s72-c/defcon_police.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-1142311680835035726</id><published>2025-08-23T09:35:00.000-07:00</published><updated>2025-08-26T13:08:47.519-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="azure"/><category scheme="http://www.blogger.com/atom/ns#" term="black hat"/><category scheme="http://www.blogger.com/atom/ns#" term="course review"/><category scheme="http://www.blogger.com/atom/ns#" term="detection engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="falcon force"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="sentinel"/><category scheme="http://www.blogger.com/atom/ns#" term="training"/><title type='text'>Course Review: &quot;Advanced Detection Engineering in the Enterprise&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihDQi5vwvNGlg_1HxEjqiCzRU-6EdShICf8bZbhZQw0ZJq6TrZ4dej2qHfFrBwpHkbOjDqYyqs6YXVO_n9ru0dOGEzebGZEcnCDn5xQ7hqyR9dBa-1GOwG7DIWEyr11QGtiF4Nac93NtCHxrCa2xHFzGUy74zGZWAfp3dz6zSTiubMMjGqNFTIxN3jTxBn/s6250/falconforce_cover.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1058&quot; data-original-width=&quot;6250&quot; height=&quot;109&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihDQi5vwvNGlg_1HxEjqiCzRU-6EdShICf8bZbhZQw0ZJq6TrZ4dej2qHfFrBwpHkbOjDqYyqs6YXVO_n9ru0dOGEzebGZEcnCDn5xQ7hqyR9dBa-1GOwG7DIWEyr11QGtiF4Nac93NtCHxrCa2xHFzGUy74zGZWAfp3dz6zSTiubMMjGqNFTIxN3jTxBn/w640-h109/falconforce_cover.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;I recently took &quot;&lt;a href=&quot;https://falconforce.nl/services/training/advanced-detection-engineering-training/&quot;&gt;Advanced Detection Engineering in the Enterprise&lt;/a&gt;&quot; at BlackHat USA 2025. The course was taught by the FalconForce team, including the founders Olaf&amp;nbsp;&lt;span data-huuid=&quot;18195436073490166057&quot;&gt;&lt;span&gt;Hartong and H&lt;/span&gt;&lt;/span&gt;&lt;span data-huuid=&quot;18195436073490166057&quot;&gt;&lt;span&gt;enri Hambartsumyan, as well as&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;Theo Raedschelders and James Gratchoff. This was an amazing course, that largely focused on Windows detections leveraging modern Azure detection stacks.&amp;nbsp;&lt;/span&gt;Microsoft Defender for Endpoint (MDE) and Azure Sentinel being the main hunting and detection platforms for log searching.&amp;nbsp;The course followed a fantastic purple teaming structure, by providing us with fully instrumented Attacker and Victim VMs, that we could use to execute attacks and then hunt and detect said attacks in the logs.&amp;nbsp;We were provided offensive tools such as Mythic, for command and control, and were able to emulate many modern, Windows, attacker tools and techniques, such as SharpHound, Mimikatz, ClickOnce Apps, HTML Smuggling, Living off the Land Drivers, DLL Hijacking, and even Macro weaponization. After executing the attacks we worked on many robust detections for said attacks, such as non-system processes making smb or kerberos calls. Overall these were highly relevant and modern techniques on both sides, with attacks that work in modern environments as well as effective and widely applicable detections for said attacks. The first two days focused on local enterprise detections using onsite technologies like MDE and instrumented host VMs. We used tools like OneClick and executed techniques like DLL hijacking and agent beaconing. Later we used SOCKS proxies to tunnel through our agents and hit further targets in the environment.&amp;nbsp;The second two days focused on detections in the cloud using cloud-logs in Sentinel. Here we looked at techniques like cloud credential phishing and further Azure post-exploitation techniques and detections.&amp;nbsp;The training included tons of good theory that was also applicable to non-Micorsoft environments, such as optimizing search queries, where / what logs to collect, and what log sources to write certain detections on (and why). They also broke down a lot of the technologies, showing edge cases in timing queries, and how certain join statements were better in certain situations, all very useful stuff if are trying to&amp;nbsp; debug query results in an investigation. They also taught a lot of meta-detection theory, such as storing detections as code, keeping wiki pages on every detection, and testing their detection pipelines end-to-end in an automated way.The lab was&amp;nbsp; brilliant as it incorporated both attacker and defender VMs that were both fully instrumented with the right tools and logging. My group often goofed around on the VMs and attacked each other using different techniques after we finished the labs. It was a wonderful environment to play around in and then hunt those activities.&amp;nbsp;The adversary simulation was also very well throughout, it wasn&#39;t canned but was still representative of modern TTPs with edge cases considered for both escalations and detections. Overall, I highly recommend the course to defenders and attackers at every level. I think this is an amazing purple teaming course, and offers something to everyone. That said, I think the course will have a larger impact if your day-to-day environment is Windows or Azure based. I truly believe in learning both the attacker and defender techniques for a more holistic understanding of computer security and this course teaches exactly that. Even if you are a beginner I think you could follow this material, and if you are an expert there is so much cool esoteric knowledge packed into this course (and room to do your own stuff), that I promise you will enjoy it.&amp;nbsp;The following is an older video of Olaf&#39;s but covers a good amount of the theory and approach to detections that they take as a group.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/zMPouyUNX5c?si=i8zMFqmSt2AcN3HM&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/1142311680835035726/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/1142311680835035726' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1142311680835035726'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1142311680835035726'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/08/course-review-advanced-detection.html' title='Course Review: &quot;Advanced Detection Engineering in the Enterprise&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihDQi5vwvNGlg_1HxEjqiCzRU-6EdShICf8bZbhZQw0ZJq6TrZ4dej2qHfFrBwpHkbOjDqYyqs6YXVO_n9ru0dOGEzebGZEcnCDn5xQ7hqyR9dBa-1GOwG7DIWEyr11QGtiF4Nac93NtCHxrCa2xHFzGUy74zGZWAfp3dz6zSTiubMMjGqNFTIxN3jTxBn/s72-w640-h109-c/falconforce_cover.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-594696412152331643</id><published>2025-07-30T16:06:00.000-07:00</published><updated>2025-08-14T11:35:45.553-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Audible"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="counter terrorism"/><category scheme="http://www.blogger.com/atom/ns#" term="show"/><title type='text'>Book Review: &quot;Countered Terrorism&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAljhB2pajmusS2Uxsa_jNp8yiTqcjpuH3ntxDM3NrDRUklOAyJoqwzzGo7jWb_5n1Ks0iq2zbHxXZdG7GFoU5mRm19R5U6YMS4O11RWg4bfU91uV5ADZvqBGsrpgEzV29X1lHXp3KEx7rWTv0_RJk42QC2hyphenhyphenvQFLc9A_9MFD4vllUkTmuObGodZnKJW2/s500/counterterrorism.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;500&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAljhB2pajmusS2Uxsa_jNp8yiTqcjpuH3ntxDM3NrDRUklOAyJoqwzzGo7jWb_5n1Ks0iq2zbHxXZdG7GFoU5mRm19R5U6YMS4O11RWg4bfU91uV5ADZvqBGsrpgEzV29X1lHXp3KEx7rWTv0_RJk42QC2hyphenhyphenvQFLc9A_9MFD4vllUkTmuObGodZnKJW2/w400-h400/counterterrorism.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Countered Terrorism: Real Life terror plots... Foiled&quot; isn&#39;t actually a book, but rather a short 6 episode series on Audible. That said, the series is incredible, and a rare look at counter intelligence operations gone right! It&#39;s a pretty incredible collection of stories that highlights how counter intelligence can truly be successful in stopping activities left of bang, and some of the critical components that go into those decisions.&amp;nbsp;Presented by David Harewood, David adds a Hollywood spin to the entire thing although regularly interviews to experts and law enforcement close to the situations for the ground truth. This makes the series both highly entertaining and deeply informative. Overall I give the series 7 out of 10, for being engaging and informative, although I wish it was less commercial and dug more into the the forensic details of the investigations. I also recommend it to those interested in intelligence operations or security operations, as making intelligence actionable and heading off big attacks is almost everyone&#39;s ideal situation.&amp;nbsp;You can listen to the series for free on Audible, which consists of 6 short stories, each an hour in length.&amp;nbsp;The episodes are as follows:&lt;/p&gt;&lt;p&gt;Ep 1: Day of Terror: Undercover in Manhattan&lt;br /&gt;Ep 2: Capital Blackout: IRA Dreams of A Dark City&lt;br /&gt;Ep 3: The Liquid Bomb Plot: Foiling Britain&#39;s Deadliest Plot&lt;br /&gt;Ep 4: The London Nail Bomber: Rampage of Hate&lt;br /&gt;Ep 5: Terrorist007: Catching a Chatroom Jihadi&lt;br /&gt;Ep 6: MoonMetropolis: When a Troll Becomes a Terrorist&lt;/p&gt;&lt;p&gt;The episodes were fascinating and insightful, each of them showing the story of various types of radicalization and various novel terrorist techniques. The stories are wonderfully told and build suspense throughout them, although they tend to focus on the key forensic and intelligence details that allowed them to break the case early. It&#39;s this very concept of breaking an intel case early, or shifting the execution to left of bang, that is both so effective and rare. Very rarely do you have all of the evidence you need to act before the incriminating event happens, but these stories repeatedly show how operating on &#39;just enough&#39; information is sometimes more valuable in terms of interception than as opposed to not acting because you don&#39;t have enough information.&amp;nbsp;The following is an except from one of the stories, &quot;The Liquid Bomb Plot&quot;, featuring both David and several interviews with those directly involved:&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/H4GK_qay8CA?si=tdxeGyaOpstSDEZQ&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/594696412152331643/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/594696412152331643' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/594696412152331643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/594696412152331643'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/08/book-review-countered-terrorism.html' title='Book Review: &quot;Countered Terrorism&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJAljhB2pajmusS2Uxsa_jNp8yiTqcjpuH3ntxDM3NrDRUklOAyJoqwzzGo7jWb_5n1Ks0iq2zbHxXZdG7GFoU5mRm19R5U6YMS4O11RWg4bfU91uV5ADZvqBGsrpgEzV29X1lHXp3KEx7rWTv0_RJk42QC2hyphenhyphenvQFLc9A_9MFD4vllUkTmuObGodZnKJW2/s72-w400-h400-c/counterterrorism.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4941271471399708079</id><published>2025-06-19T22:55:00.000-07:00</published><updated>2025-11-07T09:23:11.848-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="Corporate"/><category scheme="http://www.blogger.com/atom/ns#" term="Fournier"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Manager&#39;s Path"/><category scheme="http://www.blogger.com/atom/ns#" term="self help"/><title type='text'>Book Review: &quot;The Manager&#39;s Path&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwOV7EF7NUXecw-O5A5ikJt3nfBc4Gzbs39oqd8UHgk0OEDO1Ww_Fot1o0hF_VEHbTbwGhGg74d1Ug23J74Hz-oWcPRwDnucfifSnvPw6QgJW8uyOI1RFEjniHJvjXJ0lrKo_-ksNsP3peYoZkySZgBPecPT-p5KfeSvHyTRpdMEtNY544vMXiotAr9tl1/s1000/managerspath.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;667&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwOV7EF7NUXecw-O5A5ikJt3nfBc4Gzbs39oqd8UHgk0OEDO1Ww_Fot1o0hF_VEHbTbwGhGg74d1Ug23J74Hz-oWcPRwDnucfifSnvPw6QgJW8uyOI1RFEjniHJvjXJ0lrKo_-ksNsP3peYoZkySZgBPecPT-p5KfeSvHyTRpdMEtNY544vMXiotAr9tl1/w266-h400/managerspath.jpg&quot; width=&quot;266&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;The Manager&#39;s Path: A Guide for Tech Leaders Navigating Growth and Change&quot; by Camille Fournier is an incredible book for the various levels of management, showing managers how to scale their skills throughout their career. It’s probably the definitive book you hand to a new manager. I listened to it on audible on for free, which is an incredible deal for a book of this caliber. Overall I give it 8 out of 10 starts for having tons of practical tips for actually managing a work force in the modern era. I recommend it to really anyone in corporate America as I think it can help explain a lot of modern mid-level management motions. I really like how the book covers some common new leader pitfalls, such as being overly controlling or a micro manager. A sign of a great leader in my opinion is someone who can provide guidance and set people up for success, while empowering them to really make the work their own. Throughout the book Fournier emphasizes clarity, expectation-setting, and honest two-way communication. In my typical fashion, the following are the chapters of the book:&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 1: Management 101&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;What to Expect from a Manager&lt;br /&gt;How to be Managed&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 2: Mentoring&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;The Importance of Mentoring to Junior Team Members&lt;br /&gt;Being a Mentor&lt;br /&gt;Good Manager, Bad Manager: The Alpha Geek&lt;br /&gt;Tips for the Manager of a Mentor&lt;br /&gt;Key Takeaways for the Mentor&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 3: Tech Lead&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;Being a Tech Lead 101&lt;br /&gt;Managing Projects&lt;br /&gt;Managing a Project&lt;br /&gt;Decision Point: Stay on the Technical Track or Become a Manager&lt;br /&gt;Good Manager, Bad Manager: The Process Czar&lt;br /&gt;How to be a Great Tech Lead&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 4: Managing People&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;Starting a New Reporting Relationship Off Right&lt;br /&gt;Communicating with Your Team&lt;br /&gt;Different 1-1 Styles&lt;br /&gt;Good Manager, Bad Manager: Micromanager, Delegator&lt;br /&gt;Practical Advice for Delegating Effectively&lt;br /&gt;Creating a Culture of Continuous Feedback&lt;br /&gt;Performance Reviews&lt;br /&gt;Cultivating Careers&lt;br /&gt;Challenging Situations: Firing Underperformers&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 5: Managing A Team&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;Staying Technical&lt;br /&gt;Debugging Dysfunctional Teams: The Basics&lt;br /&gt;The Shield&lt;br /&gt;How to Drive Good Decisio/ns&lt;br /&gt;Good Manager, Bad Manager: Conflict Avoider, Conflict Tamer&lt;br /&gt;Challenging Situations: Team Cohesion Destroyers&lt;br /&gt;Advanced Project Management&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;b&gt;&lt;u&gt;Chapter 6: Managing Multiple Teams&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;Managing Your Time: What&#39;s Important, Anyway?&lt;br /&gt;Decisions and Delegation&lt;br /&gt;Challenging Situations: Strategies for Saying No&lt;br /&gt;Technical Elements Beyond Code&lt;br /&gt;Measuring the Health of Your Development Team&lt;br /&gt;Good Manager, Bad Manager: Us Versus Them, Team Player&lt;br /&gt;The Virtues of Laziness and Impatience&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;b&gt;&lt;u&gt;Chapter 7: Managing Managers&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;Skip-Level Meetings&lt;br /&gt;Manager Accountability&lt;br /&gt;Good Manager, Bad Manager: The People Pleaser&lt;br /&gt;Managing New Managers&lt;br /&gt;Managing Experienced Managers&lt;br /&gt;Hiring Managers&lt;br /&gt;Debugging Dysfunctional Organizations&lt;br /&gt;Setting Expectations and Delivering on Schedule&lt;br /&gt;Challenging Situations: Roadmap Uncertainty&lt;br /&gt;Staying Relevant&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;b&gt;&lt;u&gt;Chapter 8: The Big Leagues&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;Models for Thinking About Tech Senior Leadership&lt;br /&gt;What&#39;s a VP of Engineering?&lt;br /&gt;What&#39;s a CTO?&lt;br /&gt;Changing Priorities&lt;br /&gt;Setting the Strategy&lt;br /&gt;Challenging Situations: Delivering Bad News&lt;br /&gt;Senior Peers in Other Functions&lt;br /&gt;The Echo &lt;br /&gt;Ruling with Fear, Guiding with Trust&lt;br /&gt;True North&lt;br /&gt;Recommended Reading&lt;br /&gt;Assessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 9: Bootstrapping Culture&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;Assessing Your Role&lt;br /&gt;Creating Your Culture&lt;br /&gt;Applying Core Values&lt;br /&gt;Creating Cultural Policy&lt;br /&gt;Writing A Career Ladder&lt;br /&gt;Cross-Functional Teams&lt;br /&gt;Developing Engineering Processes&lt;br /&gt;Practical Advice: Depersonalize Decision Making&lt;br /&gt;Accessing Your Own Experience&lt;br /&gt;&lt;u&gt;&lt;b&gt;Chapter 10: Conclusion&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;The book feels especially practical for engineers moving into management, offering advice grounded in real-world experience. I personally found a lot of it very intuitive having worked several jobs
 in the bay area, that said I could see it being even more impactful
to someone who hasn&#39;t worked where these aren&#39;t already regular practices. It includes core tips such as scheduling regular one on ones, or personal meetings with your directs and others around the company. This includes keeping notes from these meetings for both interpersonal development as well as managerial responsibilities (unblocking, performance reviews, etc...). Not only does this strengthen relationships it puts actionable tasks and strategies to the responsibilities of managing technical individuals. The book really speaks to a technical audience when it talks about debugging relationships and corporate issues using tools like meetings and documentation. The book scales throughout the many levels a manger&#39;s career could take them, such as up to director and c-suite. At those levels the book talks about leading more from a strategic and culture perspective, and provides many great tips for guiding a company at that degree. Finally I like how the book makes a point of highlighting that if culture isn&#39;t set out explicitly it can develop negatively on it&#39;s own. It reframes why so many bay area companies use strong cultural credos as a core part of their identity. It really drives this point home using Apples as an example and the culture Steve Jobs created there, and how his culture is still referenced decades later as a decision making argument. The following is an interview with Camille Fournier, so you can hear some of the good advice straight from her:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/hZSh0rs20uI?si=_-4KslAH7xG7Ltxg&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/4941271471399708079/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4941271471399708079' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4941271471399708079'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4941271471399708079'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/06/book-review-managers-path.html' title='Book Review: &quot;The Manager&#39;s Path&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwOV7EF7NUXecw-O5A5ikJt3nfBc4Gzbs39oqd8UHgk0OEDO1Ww_Fot1o0hF_VEHbTbwGhGg74d1Ug23J74Hz-oWcPRwDnucfifSnvPw6QgJW8uyOI1RFEjniHJvjXJ0lrKo_-ksNsP3peYoZkySZgBPecPT-p5KfeSvHyTRpdMEtNY544vMXiotAr9tl1/s72-w266-h400-c/managerspath.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-305694347933262117</id><published>2025-06-11T17:31:00.000-07:00</published><updated>2025-06-20T11:35:15.850-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="27"/><category scheme="http://www.blogger.com/atom/ns#" term="Bootcamp"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="qbot"/><category scheme="http://www.blogger.com/atom/ns#" term="quackbot"/><title type='text'>Bootcamp #27: Real-World Phishing Response and Malware Triage</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbHonxi8SMWOyC2uZ04DxZHXToWJmDhCWe0DuIMXzzmOS2dssrQMqNdvhyphenhyphen0XxC7oQ3AVL6URxga_gfnMzY9exR0m4AAikRZRmwVma24iLUQ63vGFtsNm_ox4lQAxt56LE-KaCBVtZzMCHHBSX1FD6DZOUgPsmP_Tq9t9Ja0UlaWNJTL22THlNUFHUEO5j/s1024/quakbot.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbHonxi8SMWOyC2uZ04DxZHXToWJmDhCWe0DuIMXzzmOS2dssrQMqNdvhyphenhyphen0XxC7oQ3AVL6URxga_gfnMzY9exR0m4AAikRZRmwVma24iLUQ63vGFtsNm_ox4lQAxt56LE-KaCBVtZzMCHHBSX1FD6DZOUgPsmP_Tq9t9Ja0UlaWNJTL22THlNUFHUEO5j/w400-h400/quakbot.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Welcome back all! This is the latest installment of my bootcamp series, as I&#39;m currently mentoring several padawan hackers. This session will focus on a training video I made over 2 years ago on triaging an advanced phish and QuackBot malware strain. I encourage you to watch the video slowly as it&#39;s jam packed with quick, but seasoned triage tips. &lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/chGZHF-0jeI?si=649eW4kIo-I6Bq9s&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/305694347933262117/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/305694347933262117' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/305694347933262117'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/305694347933262117'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/06/bootcamp-27-real-world-phishing.html' title='Bootcamp #27: Real-World Phishing Response and Malware Triage'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbHonxi8SMWOyC2uZ04DxZHXToWJmDhCWe0DuIMXzzmOS2dssrQMqNdvhyphenhyphen0XxC7oQ3AVL6URxga_gfnMzY9exR0m4AAikRZRmwVma24iLUQ63vGFtsNm_ox4lQAxt56LE-KaCBVtZzMCHHBSX1FD6DZOUgPsmP_Tq9t9Ja0UlaWNJTL22THlNUFHUEO5j/s72-w400-h400-c/quakbot.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6224473229849523371</id><published>2025-06-08T08:25:00.000-07:00</published><updated>2025-06-08T08:25:23.951-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="communication"/><category scheme="http://www.blogger.com/atom/ns#" term="improved"/><category scheme="http://www.blogger.com/atom/ns#" term="Nonviolent communication"/><category scheme="http://www.blogger.com/atom/ns#" term="NVC"/><category scheme="http://www.blogger.com/atom/ns#" term="self help"/><title type='text'>Book Review: &quot;Nonviolent Communication&quot; </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxfFdxYO-Zs4EJ0BatkMcQvc4OR8Eqlg5al8wTHRfuunt3NcMl1ueKY473FBn7J74lWgdfe1PRh8e6l2b3w5gvqc2V47qzKukOUmnHydjAXuOVKSWjli2Gl8LrLmIQhB5SRtYO8e7osHS3Cq7jv2eaLFizB0PBhklW5qAVeGecYWNgv2nHhAUoMKpmbRNU/s1000/NVC.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;626&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxfFdxYO-Zs4EJ0BatkMcQvc4OR8Eqlg5al8wTHRfuunt3NcMl1ueKY473FBn7J74lWgdfe1PRh8e6l2b3w5gvqc2V47qzKukOUmnHydjAXuOVKSWjli2Gl8LrLmIQhB5SRtYO8e7osHS3Cq7jv2eaLFizB0PBhklW5qAVeGecYWNgv2nHhAUoMKpmbRNU/w250-h400/NVC.jpg&quot; width=&quot;250&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&quot;Nonviolent Communication: A Language of Life&quot; by Marshall Rosenberg was a great and very enlightening book. It offers a simple yet profound approach to improving how we communicate, not only with others but also with ourselves. Whether you&#39;re navigating difficult conversations at work, struggling in your relationships, or simply looking to be more mindful in your everyday interactions, Nonviolent Communication provides tools that can lead to more peace and understanding. This book isn&#39;t just about how to re-frame our conversations, it&#39;s about how to truly connect. Rosenberg teaches a method of communication that reduces conflict, fosters empathy, and gets to the heart of human needs. I listened to it &lt;a href=&quot;https://www.amazon.com/Nonviolent-Communication-audiobook/dp/B00TKMBJKE&quot;&gt;on Audible&lt;/a&gt;, as read by Marshall himself, for about 5 hours at less than $3! Great book, I highly recommend it for those looking to improve corporate communication or those looking to improve their interpersonal relationships. For anyone who wants to be heard without coming across as aggressive, this book is a must-read. As for the actual methodology, it breaks down into four simple steps. &lt;br /&gt;&lt;br /&gt;The Nonviolent Communication (NVC) formula is as follows:&lt;br /&gt;1. Observations&lt;br /&gt;2. Feels&lt;br /&gt;3. Needs&lt;br /&gt;4. Requests&lt;/p&gt;&lt;p&gt;These steps might seem basic on the surface, but the book dives deep into how they can fundamentally shift the way we relate to others. When applied correctly, this formula becomes a powerful tool for reducing judgement and conflict, while increasing mutual understanding. The book also shows how people encounter frustrations when their needs aren&#39;t being met, but also when they fail to express those needs. Often, we resort to blame or passive aggression instead of simply naming what we need. NVC teaches us to take responsibility for our emotions and communicate in a way that invites cooperation rather than defensiveness. One of the secret, super powers within the book is actually being able to interpret people&#39;s needs and requests despite them not even making it clear.&amp;nbsp; Rosenberg shows how we can develop the skill of hearing the unspoken needs and feelings behind someone’s message, even when they express themselves in a way that sounds aggressive or critical. This shift in perception can turn tense conversations into opportunities for empathy and resolution. The book also spends a lot of time talking about judgment language, and how when we use language that judges we are far less likely to get our needs met, as the recipient will likely shut down or resist us in response. When we use language that judges, we often trigger resistance or defensiveness in others, making it less likely our needs will be heard or met. Overall, Nonviolent Communication is more than a communication guide; it’s a mindset shift. Whether you&#39;re looking to improve workplace dynamics or deepen personal relationships, this book offers invaluable tools to speak, and listen, with compassion and clarity. I hope you enjoy this as much as I did! Please leave any thoughts or feedback in the comments!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/6224473229849523371/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6224473229849523371' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6224473229849523371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6224473229849523371'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/06/book-review-nonviolent-communication.html' title='Book Review: &quot;Nonviolent Communication&quot; '/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxfFdxYO-Zs4EJ0BatkMcQvc4OR8Eqlg5al8wTHRfuunt3NcMl1ueKY473FBn7J74lWgdfe1PRh8e6l2b3w5gvqc2V47qzKukOUmnHydjAXuOVKSWjli2Gl8LrLmIQhB5SRtYO8e7osHS3Cq7jv2eaLFizB0PBhklW5qAVeGecYWNgv2nHhAUoMKpmbRNU/s72-w250-h400-c/NVC.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-427380735708582315</id><published>2025-05-29T09:19:00.000-07:00</published><updated>2025-05-29T09:19:41.071-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Adrian Tchaikovsky"/><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="automation"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="future"/><category scheme="http://www.blogger.com/atom/ns#" term="sci fi"/><category scheme="http://www.blogger.com/atom/ns#" term="service model"/><title type='text'>Book Review: &quot;Service Model&quot;</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqNmYkfhAHsvkfO7xmUp15AQRNZgZ2xPI2vHAeX8M1QcFiqrI1bCX6_RfVF5WDz1rrKoevTt9ACShk6woxyqKjJDMGo2UwGK0dHNXQOooR9drveeBbjU4lPZ0E0anTxbHQT2s-6kZJUnWnSkY0eCaxLXrictm-F8kN9wSBS5xqkmBvJN-BaY9dnURnsI4p/s595/service_model.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;595&quot; data-original-width=&quot;385&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqNmYkfhAHsvkfO7xmUp15AQRNZgZ2xPI2vHAeX8M1QcFiqrI1bCX6_RfVF5WDz1rrKoevTt9ACShk6woxyqKjJDMGo2UwGK0dHNXQOooR9drveeBbjU4lPZ0E0anTxbHQT2s-6kZJUnWnSkY0eCaxLXrictm-F8kN9wSBS5xqkmBvJN-BaY9dnURnsI4p/w259-h400/service_model.jpg&quot; width=&quot;259&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;I recently read &quot;Service Model&quot; by Adrian Tchaikovsky, published mid 2024, and I&#39;ve been telling everyone to read this. The book extremely timely in terms of its message about the future of humanity and automation, and I think it comes at an important time. That said, I think this book is very love or hate for many people. I absolutely love it, but some people find it very dry and boring, as it&#39;s both long and the main character thinks like a robot throughout the entire book. The book is a long journey of self discovery, as Uncharles searches for a new master but along the way discovers a very broke world, finds the answer to how things came to be, meets God, ultimately grapples with consciousness, humanism, and self determination throughout the story. The book also doesn&#39;t have a ton of action, it really lends itself to some fantastic nods to great writing, deep character dialogues, ironic thought experiments, and cautious sci-fi predictions. The book is fairly long at 400+ pages, that said I think it goes quickly as it is divided into five distinct sections that each have their own style and goals, making it fun and fast throughout each section. You can almost think of it as reading 5 short stories that are part of a larger epic. I listened to it on audible, which was also read by Adrian Tchaikovsky, which if you read my reviews you will know I really enjoy (when an author reads their own work). Speaking of Audible, it&#39;s also &lt;i&gt;free&lt;/i&gt; with a membership, currently, so take advantage of that! Overall I give the book 8 out of 10 stars for being a very timely read and pointed critique of the AI automation craze that is taking over so many industries currently. I actually recommend it to anyone working in tech or policy, and especially recommend it to programmers as I think they will find Uncharles robotic humor great. It also feels like a love letter to his literary influences, filtered through his own seasoned and playful voice. As a writer, this kind of stylistic pastiche is not only fun but also deeply rewarding when done well. Tchaikovsky is a master of “show, don’t tell,” allowing the story’s ideas to emerge organically over time as Uncharles embarks on his adventure. The following are the sections of the books (and which authors they represent), and how many chapters each section contains.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Part I: KR15-T (Agatha Kristie)&lt;br /&gt;Chapters 1 - 4&lt;br /&gt;Interconnection I&lt;br /&gt;Part II: K4FK-R (Franz Kafka)&lt;br /&gt;Chapters 5 - 9&lt;br /&gt;Transition II&lt;br /&gt;Part III: 4W-L (George Orwell)&lt;br /&gt;Chapters 10 - 16&lt;br /&gt;Transition III&lt;br /&gt;Part IV: 8ORH-5 (Jorge Luis Borges)&lt;br /&gt;Chapter 17 - 21&lt;br /&gt;Interconnection IV&lt;br /&gt;Part V: D4NT-A (Dante Alighieri)&lt;br /&gt;Chapter 22 - 31&lt;br /&gt;Epilogue&lt;/p&gt;&lt;p&gt;&amp;nbsp;I think this book really encapsulates many of the modern problems with AI and automation in general, from software that no longer receives patches to perversely incentivized automated systems. One of my favorite re-occuring themes was this idea that Uncharles was on the verge of independent thought, in the sense that humans can&#39;t help but think these are &quot;intelligent&quot; machines because they sound and look human in many ways. I see this a lot with AI where people attribute actual thinking to what is statistical generation. There are many other modern phenomenon having to do with this automation age that the book captures super well. From robots generating &quot;emotional-like&quot; responses only for their logic units to override those to entire service centers that are caught in automation loops and errors, resulting in the external systems then erroring with no way of repair. I really like how it gives this sense of of run away human and robotic interpretation while maintaining only really one human character throughout the book. The ultimate message is really important, which is not to lose our humanity in spite of all of these advancements and automations. If we ever get to the place of automating away the common laborer then we need to care for them in some way otherwise the foundations of human society will easily collapse around us. I also really appreciate how Adrian tries to mirror some of his favorite writers in each part of the book. The following are some of those observations to their respective parts. The first part tries to emulate Agatha Christie. This part was wildly hilarious to me as both an investigator and a huge Christie fan. I liked the Poirot like reveal where the detective gathers all the house robots in a room to announce that Uncharles is not a murder, despite Uncharles persisting that he did murder his master. This was an incredibly ironic and hilarious part in my opinion. Second part tries to emulate some of Franz Kafka&#39;s absurd bureaucratic labyrinth such as in The Trial or The Castle. The tone of these chapters are increasingly surreal as Uncharles meets The Wonk and things go very sideways in the service center. The third part pays homage to George Orwell&#39;s animal farm and 1984. This part really hammers home how dark a fully automated future could be. This part not only critiques the authoritarian nature of the Farm, but also shows where AI can use perverse incentives to negatively impact human life. The fourth part alludes to Jorge Luis Borge&#39;s The Library of Babel, and was probably one of my favorite parts of the book. This part of the book takes a deeply philosophical turn and uses much symbolism to convey the idea of knowledge and how the context of knowledge matters more than the individual data points. I also like how much of an allusion to modern LLMs this is, in that they use context to understand things. The fifth and final part refers to Dante Alighieri and his Divine Comedy. This part is excellent and shows Uncharles journeying into a version of a robotic hell. At the end of this chapter Uncharles meets a figure who calls himself god (and can equally be viewed as a devil), and attempts to give Uncharles what he desires. Uncharles is eventually unhappy with all of the options god gives him and ends up siding with The Wonk. I won&#39;t spoil the actual ending of the book, but short to say you should read it for each section alone! The book is highly thought provoking and fun the way it pays homage to various other important authors in history. Overall I really enjoyed this book and highly recommend it to others!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/427380735708582315/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/427380735708582315' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/427380735708582315'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/427380735708582315'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/05/book-review-service-model.html' title='Book Review: &quot;Service Model&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqNmYkfhAHsvkfO7xmUp15AQRNZgZ2xPI2vHAeX8M1QcFiqrI1bCX6_RfVF5WDz1rrKoevTt9ACShk6woxyqKjJDMGo2UwGK0dHNXQOooR9drveeBbjU4lPZ0E0anTxbHQT2s-6kZJUnWnSkY0eCaxLXrictm-F8kN9wSBS5xqkmBvJN-BaY9dnURnsI4p/s72-w259-h400-c/service_model.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6769488210931961316</id><published>2025-04-29T04:10:00.000-07:00</published><updated>2025-04-30T00:45:56.882-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2025"/><category scheme="http://www.blogger.com/atom/ns#" term="blue team"/><category scheme="http://www.blogger.com/atom/ns#" term="CCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="collegiate cyber defense competition"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="National"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Team"/><title type='text'>Red Teaming at NCCDC 2025</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPuf3HAJNd-0BNE8W10iqFQY51uPueYsSoLkK0B62YLuUIuvDKFmwCsfKacaAfgLFlXQnJF0nS9L9Glpm_Qf2KsbdLPpAJygHAfS3JjGFtYzvkN_ZjZeCNi0OspgZ7gV_ksfKyQLa-b-sDMmm4cXJH7Opc6JcYltZAhiKcbKnGUDMJgv1RhpmagYSurZBQ/s4032/IMG_3492.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3024&quot; data-original-width=&quot;4032&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPuf3HAJNd-0BNE8W10iqFQY51uPueYsSoLkK0B62YLuUIuvDKFmwCsfKacaAfgLFlXQnJF0nS9L9Glpm_Qf2KsbdLPpAJygHAfS3JjGFtYzvkN_ZjZeCNi0OspgZ7gV_ksfKyQLa-b-sDMmm4cXJH7Opc6JcYltZAhiKcbKnGUDMJgv1RhpmagYSurZBQ/w640-h480/IMG_3492.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This was another solid virtual CCDC year.&amp;nbsp;This year was remote again (we had another virtual NCCDC during the 
pandemic) so the blue teamers played from their respective schools / 
areas, and members of the red team all gathered in various locations to 
play together. We had some people meet on the east coast, some 
people meet up in Texas, and others just play remote. I met up w/ Dave, Evan, Alex and others in Las 
Vegas, where we hacked together from a suite in the Cosmo. Before we get too far into it, this year the winning teams were: &lt;br /&gt;&lt;b&gt;1st:&lt;/b&gt; &lt;u&gt;University of California, Irvine&lt;/u&gt;&lt;br /&gt;&lt;b&gt;2nd: &lt;/b&gt;&lt;u&gt;University of Virginia&lt;/u&gt;&lt;br /&gt;&lt;b&gt;3rd:&lt;/b&gt; &lt;u&gt;Dakota State University&lt;/u&gt;&lt;/p&gt;&lt;p&gt;We got to use alot of the virtual CCDC infrastructure, which I enjoy as it feels like a second home for me now. We set up Tailscale as the VPN, we had Traphouse for reporting, Grid for hosting, IP pools (for dividing up our operations), private pastebins, and even a special AI service provided by Scale AI. We had a bunch of shared C2 options, and a massive collection of local malware stockpiled from over the years. I personally ran 3 VMs, one for throwing, one as a backup C2 in the environment, and one for hosting various items (as a grid fallback) or using as shared access. I also used a team hosted server of Realm, my own locally hosted instance, and a Butterfly implant for a DNS covert channel as my callback command and control this year. I&#39;ve really been enjoying &lt;a href=&quot;https://github.com/spellshift/realm&quot;&gt;Realm&lt;/a&gt;, it&#39;s a great framework with lots of options in terms of &lt;a href=&quot;https://docs.realm.pub/user-guide/tomes&quot; rel=&quot;nofollow&quot;&gt;tomes&lt;/a&gt; (dynamic modules) and scriptability. And that&#39;s not counting direct connect backdoors, and indirect backdoors. We were able to get the domain based on OSINT and learned that the organization registered the &#39;oscorpi.com&#39; domain. we correctly assumed this could be related to &#39;OS Corp Industries&#39; or Marevel&#39;s The Green Goblin. So we started generating password lists for users like Harry Osborn (hosborn) and Norman Osborn (nosborn) and credentials like &#39;Gr33nG0bl1n&#39;. Our password lists ended up striking gold faster than our network exploits (with the Domain Controller on the .5), so our prediction of the organization and subsequent credentials were pretty spot on this year! I was also able to figure out which team I was assigned halfway through the competition based on tools they pulled down from their github repo, which gave me a boon of intelligence in terms of what they were looking for and their general hardening techniques. I was also able to recover some of their tools, for example they used a binary to scan and harden the machines, which was a really cool approach, reminding me of previous Blue Spawn approaches. Below is the final presentation and award ceremony. Dave&#39;s red team debrief starts at the 40:00min mark, although the whole thing is really good. &amp;nbsp; &lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/iYqfoGqIvlQ?si=i4xHU8IOXfv6_IWB&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lockboxx.blogspot.com/feeds/6769488210931961316/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6769488210931961316' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6769488210931961316'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6769488210931961316'/><link rel='alternate' type='text/html' href='http://lockboxx.blogspot.com/2025/04/red-teaming-at-nccdc-2025.html' title='Red Teaming at NCCDC 2025'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPuf3HAJNd-0BNE8W10iqFQY51uPueYsSoLkK0B62YLuUIuvDKFmwCsfKacaAfgLFlXQnJF0nS9L9Glpm_Qf2KsbdLPpAJygHAfS3JjGFtYzvkN_ZjZeCNi0OspgZ7gV_ksfKyQLa-b-sDMmm4cXJH7Opc6JcYltZAhiKcbKnGUDMJgv1RhpmagYSurZBQ/s72-w640-h480-c/IMG_3492.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry></feed>