<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8360026754900740261</id><updated>2026-05-18T15:38:59.721-07:00</updated><category term="Hacking"/><category term="book review"/><category term="Infosec"/><category term="information security"/><category term="Red Team"/><category term="CTF"/><category term="penetration testing"/><category term="blue team"/><category term="education"/><category term="CCDC"/><category term="Security"/><category term="Bootcamp"/><category term="lock boxx"/><category term="Pentesting"/><category term="forensics"/><category term="OS X"/><category term="Red Teaming"/><category term="CPTC"/><category term="Incident Response"/><category term="Linux"/><category term="malware"/><category term="pentest"/><category term="practice"/><category term="review"/><category term="writeup"/><category term="hackers"/><category term="programming"/><category term="training"/><category term="web security"/><category term="windows"/><category term="exploitation"/><category term="game hacking"/><category term="macos"/><category term="Web Hacking"/><category term="info sec"/><category term="NCCDC"/><category term="reverse engineering"/><category term="PowerShell"/><category term="purple team"/><category term="python"/><category term="leadership"/><category term="network security"/><category term="phishing"/><category term="GoLang"/><category term="ai"/><category term="cyber security"/><category term="persistence"/><category term="Apple"/><category term="Collegiate Penetration Testing Competition"/><category term="GScript"/><category term="Google"/><category term="Metasploit"/><category term="aws"/><category term="fun"/><category term="games"/><category term="SOC"/><category term="defense"/><category term="ALCCDC"/><category term="Escape Games"/><category term="PowerShell for Pentesters"/><category term="anonymous"/><category term="attack"/><category term="certification"/><category term="competition"/><category term="crypto"/><category term="def con"/><category term="github"/><category term="hacker"/><category term="social engineering"/><category term="spy"/><category term="sql injection"/><category term="2016"/><category term="c2"/><category term="cheat engine"/><category term="command and control"/><category term="cyber"/><category term="cyber war"/><category term="cybersecurity"/><category term="live response"/><category term="national ccdc"/><category term="puzzles"/><category term="tools"/><category term="web"/><category term="web application"/><category term="2015"/><category term="Active Measures"/><category term="Android"/><category term="OSINT"/><category term="Real Escape Games"/><category term="WRCCDC"/><category term="analysis"/><category term="attack defense"/><category term="blogging"/><category term="cia"/><category term="detection testing"/><category term="espionage"/><category term="hacker news"/><category term="interview"/><category term="learning"/><category term="offense"/><category term="passwords"/><category term="red vs blue"/><category term="team building"/><category term="threat intelligence"/><category term="threat modeling"/><category term="tool"/><category term="vulnerable machine"/><category term="wireshark"/><category term=".NET"/><category term="2022"/><category term="APT"/><category term="BSides"/><category term="Bitcoin"/><category term="Escape The Room"/><category term="FBI"/><category term="PSSE"/><category term="Quals"/><category term="Risk"/><category term="VCCDC"/><category term="blog"/><category term="cloud"/><category term="collegiate cyber defense competition"/><category term="computer security"/><category term="conference"/><category term="ctfs"/><category term="custom tools"/><category term="defcon"/><category term="detect"/><category term="emulation"/><category term="escape review"/><category term="fake news"/><category term="finals"/><category term="labs"/><category term="memory analysis"/><category term="mitm"/><category term="offensive security"/><category term="open source"/><category term="podcast"/><category term="post exploitation"/><category term="scanners"/><category term="self help"/><category term="shmoocon"/><category term="sparc flow"/><category term="theory"/><category term="trojan"/><category term="wargames"/><category term="xss"/><category term="2021"/><category term="Adversarial Tradecraft"/><category term="Astroturfing"/><category term="FireFox"/><category term="Google+"/><category term="IR"/><category term="Mac Hack"/><category term="Mach-O"/><category term="Nikhil Mittal"/><category term="OSX"/><category term="Triage"/><category term="Wireless"/><category term="adversarial"/><category term="analyst"/><category term="attack and defense"/><category term="binject"/><category term="botnet"/><category term="buffer overflows"/><category term="challenge"/><category term="challenges"/><category term="competitions"/><category term="computer science"/><category term="cracking"/><category term="deception"/><category term="defense in depth"/><category term="detection"/><category term="disinformation"/><category term="dropper"/><category term="escape room"/><category term="exploit writing"/><category term="exploits"/><category term="fiction"/><category term="intel analysis"/><category term="intelligence"/><category term="intelligence gathering"/><category term="mac"/><category term="management"/><category term="networking"/><category term="offensive security tools"/><category term="owasp"/><category term="presentation"/><category term="pros vs joes"/><category term="rat"/><category term="reverse shell"/><category term="securitytube.net"/><category term="simulation"/><category term="ssl"/><category term="symbolcrash"/><category term="testing"/><category term="threat emulation"/><category term="tooling"/><category term="virus"/><category term="workshop"/><category term="2018"/><category term="2019"/><category term="2020"/><category term="2023"/><category term="Assembly"/><category term="BSidesLV"/><category term="CNA"/><category term="CNO"/><category term="China"/><category term="DDOS"/><category term="DFIR"/><category term="DNS"/><category term="DevOps"/><category term="Exam"/><category term="Facebook"/><category term="Freedom"/><category term="IC"/><category term="IDS"/><category term="Info-Sec"/><category term="Intelligence Analysis"/><category term="MMORPG"/><category term="Microsoft"/><category term="Mobile"/><category term="PHP"/><category term="Pentesters"/><category term="Pwn2Own"/><category term="RIT"/><category term="RSA"/><category term="Raspberry Pi"/><category term="SANS"/><category term="Scout2"/><category term="Shadow Cats"/><category term="Smart Phone"/><category term="Social Media"/><category term="Sony"/><category term="TLS"/><category term="Tor"/><category term="YARA"/><category term="alerts"/><category term="application"/><category term="attacker"/><category term="attacks"/><category term="automation"/><category term="binjection"/><category term="black hat"/><category term="capture the flag"/><category term="cheat sheet"/><category term="cobalt strike"/><category term="course"/><category term="course review"/><category term="covert channel"/><category term="cyber attacks"/><category term="discord"/><category term="drop box"/><category term="ec2"/><category term="engineering"/><category term="escape game"/><category term="exfiltration"/><category term="fake"/><category term="freedom of information"/><category term="game"/><category term="globalcptc"/><category term="how to"/><category term="https"/><category term="hunting"/><category term="iOS"/><category term="implant"/><category term="influence"/><category term="infrastructure"/><category term="input validation"/><category term="introduction"/><category term="mdm"/><category term="new"/><category term="news"/><category term="physical"/><category term="quest"/><category term="real life room escape"/><category term="regional"/><category term="room escape"/><category term="scripting"/><category term="server"/><category term="shmoocon 2022"/><category term="spycraft"/><category term="static analysis"/><category term="symbol crash"/><category term="table top"/><category term="the sleuth kit"/><category term="threats"/><category term="tradecraft"/><category term="virtual ccdc"/><category term="virtual machine"/><category term="volatility"/><category term="vulnerabilities"/><category term="youtube"/><category term="10.9.2"/><category term="10.9.4"/><category term="100 deadly skills"/><category term="2014"/><category term="2017"/><category term="2025"/><category term="23"/><category term="3"/><category term="8"/><category term="ARD"/><category term="AT&amp;T"/><category term="Alex Levinson"/><category term="Apps"/><category term="Asis"/><category term="BSides SF 2015"/><category term="Badge"/><category term="Blackhat"/><category term="Burp"/><category term="CISA"/><category term="CTF writeup"/><category term="Chrome"/><category term="Credit Cards"/><category term="DEFCON 26"/><category term="DOS"/><category term="EDR"/><category term="Encryption"/><category term="Evilginx2"/><category term="Fraud"/><category term="GeoHot"/><category term="GoPhish"/><category term="GoRed"/><category term="HIPS"/><category term="Holiday Hack"/><category term="IAM"/><category term="IT"/><category term="Information Security."/><category term="Internet Explorer"/><category term="JCDC"/><category term="Jonathan Levin"/><category term="KEXT"/><category term="Kali"/><category term="Kali Linux"/><category term="LA"/><category term="LLM"/><category term="LLMs"/><category term="Lateral Movement"/><category term="Learning VM"/><category term="Local Network"/><category term="Lockheed Martin"/><category term="Mac Memoryze"/><category term="Mac OS X Memory Reader"/><category term="Macintosh"/><category term="Nessus"/><category term="Net Neutrality"/><category term="NoStarchPress"/><category term="PNG"/><category term="PPP"/><category term="PRCCDC"/><category term="Pentester Academy"/><category term="Permissions"/><category term="PvJ"/><category term="PwnAdventure"/><category term="RAE"/><category term="RTFM"/><category term="Richard A Clarke"/><category term="Robert Knake"/><category term="SEO"/><category term="SPSE"/><category term="San Francisco"/><category term="Secure ID"/><category term="SecurityTube"/><category term="Sliver"/><category term="Social Web"/><category term="Stanford"/><category term="Tips"/><category term="TryHackMe"/><category term="UCF"/><category term="Update"/><category term="Vivek Ramachandran"/><category term="WPA"/><category term="Wassenaar Arrangement"/><category term="Wi-fi"/><category term="Wild West Hacking Fest"/><category term="account take over"/><category term="active defense"/><category term="add-ons"/><category term="adversary"/><category term="agent"/><category term="agents"/><category term="ahhh"/><category term="allen dulles"/><category term="art"/><category term="at large"/><category term="attack vectors"/><category term="authentication"/><category term="automated"/><category term="awareness"/><category term="azure"/><category term="backdoor"/><category term="backdoors"/><category term="backups"/><category term="beacon"/><category term="binary"/><category term="blogger"/><category term="blue"/><category term="bots"/><category term="breaking in"/><category term="brute force"/><category term="btc"/><category term="business"/><category term="bypass"/><category term="charlatan"/><category term="chat bot"/><category term="chatops"/><category term="cheat"/><category term="cloud computing"/><category term="club"/><category term="coaching"/><category term="college"/><category term="collegiate pentesting competition"/><category term="command injection"/><category term="communication"/><category term="compromise"/><category term="computer history"/><category term="conferences"/><category term="configuration"/><category term="contain"/><category term="control"/><category term="counter intelligence"/><category term="counterintelligence"/><category term="critical infrastructure"/><category term="ctftime.org"/><category term="cuda"/><category term="cyber freedom"/><category term="cyber symposium"/><category term="cybercrime"/><category term="cyberpunk"/><category term="data"/><category term="data recovery"/><category term="dc562"/><category term="defense competition"/><category term="denver"/><category term="detection engineering"/><category term="docker"/><category term="drive"/><category term="dylib"/><category term="economics"/><category term="escape"/><category term="free"/><category term="fs_usage"/><category term="fuzzing"/><category term="global cyber actors"/><category term="go"/><category term="god mode"/><category term="guide"/><category term="hack"/><category term="hak5"/><category term="hashes"/><category term="history"/><category term="holiday hack challenge 2015"/><category term="humble bundle"/><category term="iPhone"/><category term="intel"/><category term="investigate"/><category term="jail breaking"/><category term="javascript"/><category term="jonathan scott"/><category term="jonathandata1"/><category term="kill chain"/><category term="kingpin"/><category term="lean"/><category term="lets hack"/><category term="locks"/><category term="lulzsec"/><category term="macho"/><category term="man in the middle"/><category term="mike lindell"/><category term="mitre"/><category term="mobile security"/><category term="modify memory"/><category term="money"/><category term="native"/><category term="network protocols"/><category term="new york times"/><category term="nfc"/><category term="nmap"/><category term="nsa"/><category term="offensive countermeasures"/><category term="operations"/><category term="patching"/><category term="payload"/><category term="pcap"/><category term="pen test"/><category term="penetration"/><category term="performance"/><category term="persistence testing"/><category term="phone security"/><category term="privacy"/><category term="process memory"/><category term="professional"/><category term="qanon"/><category term="qr code"/><category term="radare2"/><category term="raphael mudge"/><category term="recon"/><category term="reporting"/><category term="research"/><category term="response"/><category term="reverse engineering for beginners"/><category term="reversing"/><category term="rouge access point"/><category term="scam"/><category term="scanning"/><category term="scapy"/><category term="science"/><category term="scrap"/><category term="scripts"/><category term="search"/><category term="search order hijacking"/><category term="secure coding"/><category term="security awareness program"/><category term="security conferences"/><category term="security vulnerabilities"/><category term="shells"/><category term="social dynamics"/><category term="spies"/><category term="ssh"/><category term="startup"/><category term="steganography"/><category term="strategy"/><category term="tactics"/><category term="team work"/><category term="time travel"/><category term="understanding"/><category term="videos"/><category term="virtual"/><category term="virtual machines"/><category term="visibility"/><category term="vulnerability"/><category term="wordlists"/><category term="worm"/><category term="write-up"/><category term="&quot;Intelligence Analysis: A Target-Centric Approach&quot;"/><category term="*OS Internals"/><category term="1.21.7"/><category term="10.2.11"/><category term="10.3.11"/><category term="10/2/11"/><category term="10/3/11"/><category term="150"/><category term="16"/><category term="17"/><category term="18"/><category term="19"/><category term="1Hax4B"/><category term="1Hax4Bitcoin"/><category term="2.0"/><category term="2012"/><category term="2020 election"/><category term="208"/><category term="209"/><category term="21"/><category term="210"/><category term="211"/><category term="22"/><category term="24"/><category term="25"/><category term="26"/><category term="2600"/><category term="27"/><category term="2nd edition"/><category term="31337"/><category term="3ds"/><category term="4.4"/><category term="420"/><category term="60 minutes to escape"/><category term="7"/><category term="ADB"/><category term="ADHD"/><category term="AI Research"/><category term="AI Testing"/><category term="AI writting"/><category term="AMA"/><category term="AMI"/><category term="API"/><category term="ARD3"/><category term="ARDP"/><category term="ARM"/><category term="AT&amp;T Park"/><category term="ATO"/><category term="ATT&amp;CK"/><category term="Abel Wike"/><category term="Adrian Tchaikovsky"/><category term="Advent of Code 3"/><category term="Adverserial"/><category term="Agentic"/><category term="Alex Matrosov"/><category term="Alien"/><category term="An In-Depth Guide to Android&#39;s Security Architecture"/><category term="Anthony MAmore. Fraud"/><category term="Antique Room"/><category term="AoC3"/><category term="Apfell"/><category term="Apple Remote Desktop Protocol"/><category term="Artificial Intelligence"/><category term="AttackDefense"/><category term="Audible"/><category term="Audiobook"/><category term="Automater"/><category term="Automatic Maintenance"/><category term="Aws inspector"/><category term="B&amp;E"/><category term="BAHA"/><category term="BDFProxy"/><category term="BIN100"/><category term="BIN150"/><category term="BPF"/><category term="BREACH"/><category term="BSides asheville 2015"/><category term="BTFM"/><category term="Basics"/><category term="Bay Area"/><category term="BeEF"/><category term="Beau Bullock"/><category term="Bell"/><category term="Ben Clark"/><category term="Blake Masters"/><category term="Blog Response"/><category term="Book Review. information security"/><category term="Botnets"/><category term="Brawhalla"/><category term="Breaching the Cloud"/><category term="Breaking and Entering"/><category term="Broken Heart"/><category term="Burp Suite"/><category term="C#"/><category term="C&amp;C"/><category term="CCD"/><category term="CIA++"/><category term="CND"/><category term="CNE"/><category term="CNSUVA"/><category term="CPE"/><category term="CRACK99"/><category term="CSAF"/><category term="CSAW"/><category term="CWE"/><category term="Censorship"/><category term="Chinese"/><category term="Chinese Room Paradox"/><category term="Choose Your Pwn Adventure 2"/><category term="Christin Science Monitor"/><category term="Christopher Hadnagy"/><category term="Clams Don&#39;t Dance"/><category term="ClassDump"/><category term="Classic"/><category term="ClickSSL"/><category term="Closed Source"/><category term="CloudFormation"/><category term="CloudTrial"/><category term="Coding"/><category term="Comcast"/><category term="Commercial"/><category term="Common Weakness Exposure"/><category term="Computer Network Operations"/><category term="Corporate"/><category term="Cory Doctorow"/><category term="Credential Reuse"/><category term="Crowdstrike"/><category term="Cyber Defense"/><category term="CyberFed"/><category term="DEFCON 22"/><category term="DEFCON 30"/><category term="DEFCON Group"/><category term="DMA"/><category term="Daniel Suarez"/><category term="Dark Side Ops 2"/><category term="Dark Waters"/><category term="Data Exfiltration"/><category term="Dave Zwieback"/><category term="David Campbell"/><category term="David L Marquet"/><category term="David Locke Hall"/><category term="David vidal"/><category term="Dcam"/><category term="Defensive Refusal Bias"/><category term="Delaware"/><category term="Destructive"/><category term="Dichotomy"/><category term="Direct Memory Access"/><category term="Do Not Track"/><category term="Domain"/><category term="Drinking"/><category term="Drive By Download"/><category term="Droid"/><category term="Droid X"/><category term="DroidX"/><category term="Drunken Master"/><category term="EFF"/><category term="ELK"/><category term="EULA"/><category term="Edward Snowden"/><category term="Elastic Beanstalk"/><category term="Election fraud"/><category term="Electronic Fronteir Foundation"/><category term="Email"/><category term="Emotional Awareness"/><category term="Emotionally Compromised"/><category term="Engineering Cliff"/><category term="Enter The Gungeon"/><category term="Enterprise OS X"/><category term="Eric O&#39;Neill"/><category term="Ernest Cline"/><category term="Escape from Alcatraz"/><category term="EscapeSF"/><category term="EvilOSX"/><category term="Exit Game"/><category term="Export Controls for Conventional Arms and Dual-Use Goods and Technologies"/><category term="F3EAD"/><category term="FAQ"/><category term="FC Barker"/><category term="FCC"/><category term="FOCA"/><category term="Fal.Con"/><category term="Fat"/><category term="FindHim"/><category term="FireFox5"/><category term="FireWire"/><category term="Fournier"/><category term="Frank M. Ahearn"/><category term="Freaky Clown"/><category term="Free Software"/><category term="Froyo"/><category term="FruityWiFi"/><category term="Fyodor"/><category term="G8LA"/><category term="GAME150"/><category term="GAN"/><category term="GCP"/><category term="GLSE"/><category term="GOON"/><category term="GPS"/><category term="GRIMMCon"/><category term="GUI"/><category term="GWXUX"/><category term="Galak-Z"/><category term="Game of The Year"/><category term="Gametime"/><category term="Gaming malware"/><category term="Generative AI"/><category term="Georgia Weidman"/><category term="Ghost In The Shellcode 2015"/><category term="GhostInTheShellCode"/><category term="Gi0cann"/><category term="Gildart Jackson"/><category term="GingerBread"/><category term="GoRedDeath"/><category term="GoRedLoot"/><category term="GoRedPrompt"/><category term="GoRedShell"/><category term="GoRedSpy"/><category term="Google +1"/><category term="Google Circles"/><category term="Google Hangouts"/><category term="Google Sparks"/><category term="Gordon Corera"/><category term="HAM"/><category term="HAM radio"/><category term="HHC"/><category term="HID"/><category term="HTTP2"/><category term="Hacking Back"/><category term="Haxmas"/><category term="Heath Adams"/><category term="Heather Lawrence"/><category term="Hex Fiend"/><category term="Hidden Service"/><category term="Holiday Hack Challenge"/><category term="Holy Grail"/><category term="HoneyDocs"/><category term="HoneyTags"/><category term="How I Rob Banks"/><category term="I/O"/><category term="IOC"/><category term="IRC"/><category term="IRSec"/><category term="Images"/><category term="Impact Hub"/><category term="Inception"/><category term="InfoSec OASIS"/><category term="Information Dosn&#39;t Want to Be Free"/><category term="Inside Cyber Warfare"/><category term="Internals"/><category term="Intersteller"/><category term="Investment"/><category term="Ion Mihai Pacepa"/><category term="JSOC"/><category term="Java"/><category term="Javuto"/><category term="Jay Dan"/><category term="Jeremy N Smith"/><category term="Joe McCray"/><category term="JohnTheRipper"/><category term="Joint Special Operations Command"/><category term="July 12"/><category term="July 17"/><category term="Justin Hutchens"/><category term="Kase Scenarios"/><category term="Kaspersky"/><category term="Kellogg&#39;s Land"/><category term="Kelly McGonigal"/><category term="Kill"/><category term="Krebs on Security"/><category term="LA underground"/><category term="LLM content"/><category term="LOD"/><category term="LVM2"/><category term="LaForge"/><category term="Lambda"/><category term="Language of Deception"/><category term="LayerOne"/><category term="LeBonbonCroissant"/><category term="Lee Holmes"/><category term="Legion of Doom"/><category term="Let Them Theory"/><category term="Licenses"/><category term="Live stream"/><category term="Los Angeles"/><category term="M"/><category term="MH-6"/><category term="MI6"/><category term="MISP"/><category term="MOD"/><category term="MaaS"/><category term="MacSwiftShell"/><category term="MachOS"/><category term="MachOView"/><category term="MachoViz"/><category term="Manager&#39;s Path"/><category term="Manufacturing Consent"/><category term="Marshall Goldsmith"/><category term="Masters of Deception"/><category term="Matthew May"/><category term="Matthew Monte"/><category term="Mavericks"/><category term="Mel Robinson"/><category term="Memory"/><category term="Merlin"/><category term="Michael Bazzell"/><category term="Michael Hayden"/><category term="Michal Zalewski"/><category term="Mikko Hyppönen"/><category term="Mile High"/><category term="Misc 150"/><category term="Models"/><category term="Mojave"/><category term="Motorola"/><category term="Mozilla"/><category term="MsSQL"/><category term="MySQL"/><category term="NLP"/><category term="NSM"/><category term="NVC"/><category term="NYT"/><category term="Nadean H Tanner"/><category term="NahamCon"/><category term="National"/><category term="Noam Chomsky"/><category term="Nonviolent communication"/><category term="North Carolina"/><category term="Nuit Du Hack 2014"/><category term="OBA"/><category term="OSI model"/><category term="OST"/><category term="OWTF"/><category term="Observability"/><category term="Onion Rings"/><category term="Oregon"/><category term="OverTheWire"/><category term="Overcoming the Obstacles to Psychological Balance and Compassion"/><category term="PA"/><category term="PCI"/><category term="PDO"/><category term="PSA"/><category term="PSP-3061"/><category term="Palace Games"/><category term="PanIQ Room"/><category term="Parallax"/><category term="Passcode"/><category term="Paul Ekman"/><category term="Payment system"/><category term="Penetration Testing: A Hands-On Introduction to Hacking"/><category term="Persistence of Vision"/><category term="Peter Kim"/><category term="Peter Theil"/><category term="Philadelphia"/><category term="Philly"/><category term="Phone"/><category term="Playing in Tactic"/><category term="Plugin"/><category term="Portland"/><category term="PowerShell Remoting"/><category term="Prison"/><category term="Propeller"/><category term="Proprietary"/><category term="PsExec"/><category term="Puppet"/><category term="PuppetLabs"/><category term="Pwn Adventure 3"/><category term="PwnAdventureZ"/><category term="PwnPi"/><category term="Python for Secret Agents"/><category term="Python for Security Professionals"/><category term="QW5kcmV3"/><category term="Quest Factor"/><category term="RDP"/><category term="RDS"/><category term="RE4B"/><category term="RPISEC"/><category term="Real Time"/><category term="Recon-ng"/><category term="Red Team Field Manual"/><category term="RedCloud Infosec"/><category term="Registry"/><category term="Relentless Strike"/><category term="Remotely"/><category term="Remoting"/><category term="Responder.py"/><category term="Rick Howard"/><category term="Rights"/><category term="Rishi Modi"/><category term="Robert Hanssen"/><category term="Robert Spaulding"/><category term="Rochester Institute Of Technology"/><category term="Ronald J Rychlak"/><category term="Runestone"/><category term="SCE"/><category term="SCTP"/><category term="SE"/><category term="SIEM"/><category term="SMB"/><category term="SRE"/><category term="STRIDE"/><category term="Safari"/><category term="Salt"/><category term="San Jose"/><category term="Santa"/><category term="Scheduled Tasks"/><category term="Science Fiction"/><category term="Scraper"/><category term="Sean Naylor"/><category term="Secuinside CTF"/><category term="SecurID"/><category term="SecurePlanet"/><category term="Security Chaos Engineering"/><category term="Security Competitions"/><category term="Security Onion 2"/><category term="Serverless"/><category term="Shares"/><category term="Shell"/><category term="Shellbot"/><category term="Silent Break Sec"/><category term="Sinan Aral"/><category term="Site Reliability Engineering"/><category term="Slackware"/><category term="Slava Gomzin"/><category term="Smashing the stack"/><category term="Software Licensing"/><category term="Sophie Perrone"/><category term="Space travel"/><category term="Spam Nation"/><category term="Special Forces"/><category term="Spin"/><category term="Stay Alert"/><category term="Steven Lott"/><category term="Stuxnet"/><category term="Subway Butcher"/><category term="Support"/><category term="Swarm"/><category term="Switches"/><category term="System"/><category term="T1"/><category term="TAMUctf"/><category term="TCC"/><category term="TCM"/><category term="TTX"/><category term="Taipei"/><category term="Taiwan"/><category term="Team Ten4-able"/><category term="Tedx"/><category term="Terraria"/><category term="The Art of Exploitation"/><category term="The Castle"/><category term="The Dali Lama"/><category term="The Hacker Playbook"/><category term="The Human Element of Security"/><category term="The Internet"/><category term="The Office"/><category term="The Phoenix Project"/><category term="The Tangled Web"/><category term="The Upside to Stress"/><category term="Thomas Rid"/><category term="Tony and Friends"/><category term="TowerFall"/><category term="Trainings"/><category term="Transfer Files"/><category term="Trolling"/><category term="URL"/><category term="Uber"/><category term="Ubuntu"/><category term="Unbearable"/><category term="United States of America"/><category term="University of Washington"/><category term="Unmasking the Social Engineer"/><category term="User Space"/><category term="VC"/><category term="VRCCDC"/><category term="Venture Deals"/><category term="VilleTown"/><category term="VirusTotal"/><category term="VolgaCTF"/><category term="Vyrus"/><category term="WA"/><category term="WEP"/><category term="WGYHWGYT"/><category term="WMI"/><category term="WOPR"/><category term="WPA2"/><category term="WPS"/><category term="WScript"/><category term="Web Goat"/><category term="Web Scarab"/><category term="Web Server"/><category term="Welcome"/><category term="Wesley Thijs"/><category term="Whatweb"/><category term="Wheelz"/><category term="WheelzApp"/><category term="Wicked Cool PHP"/><category term="Wil Wheaton"/><category term="William R Johnson"/><category term="Windows NT"/><category term="Windows Phone"/><category term="Workflow"/><category term="XSS Rat"/><category term="YMBAB"/><category term="You must build a boat"/><category term="YourWebsite2Go"/><category term="Zero to One"/><category term="Zerospace"/><category term="a burglars guide to the city"/><category term="aaia"/><category term="academic"/><category term="access point"/><category term="account center"/><category term="active directory"/><category term="activeX"/><category term="actor"/><category term="actor centric approach"/><category term="actuarial approach"/><category term="adam shostack"/><category term="admin"/><category term="adolf tolkachev"/><category term="adversarial AI"/><category term="adverserial tradecraft"/><category term="agent swarm"/><category term="albert gonzales"/><category term="algorithms"/><category term="altimeter"/><category term="amateur radio"/><category term="amazon"/><category term="american kingpin"/><category term="amiibo"/><category term="amiibomb"/><category term="amy stweart"/><category term="analytics"/><category term="andrew grove"/><category term="andrew thompson"/><category term="andy greenberg"/><category term="anonymity"/><category term="ant-cheat"/><category term="anti-cheat"/><category term="anti-phishing"/><category term="aob scanning"/><category term="ap"/><category term="apis"/><category term="apple events"/><category term="appscript"/><category term="apt 32"/><category term="apt emulation"/><category term="architecture"/><category term="armitage"/><category term="arpanet"/><category term="art forensics"/><category term="art of the con"/><category term="asheville"/><category term="atm"/><category term="attack trees"/><category term="attacker mindset"/><category term="atul gawande"/><category term="autologon"/><category term="autopsy"/><category term="awspx"/><category term="babycmd"/><category term="back door factory"/><category term="backblaze"/><category term="backdoor factory"/><category term="banking"/><category term="bash"/><category term="bash bunny"/><category term="bayes rule"/><category term="beez-fight"/><category term="bellingcat"/><category term="best"/><category term="beyond blame"/><category term="bgb"/><category term="billion dollar spy"/><category term="binary analysis"/><category term="bitcoin address authentication"/><category term="black energy"/><category term="black hat go"/><category term="black hills"/><category term="black listing"/><category term="black market"/><category term="blind"/><category term="blinkist"/><category term="blocking"/><category term="blog posts"/><category term="blue coat"/><category term="blue team toolkit"/><category term="blue teams"/><category term="bluespawn"/><category term="bluetooth"/><category term="board presentations"/><category term="bolo"/><category term="booby traps"/><category term="book"/><category term="bootkits"/><category term="bottom up"/><category term="bounty"/><category term="boxman"/><category term="brain game"/><category term="brain virus"/><category term="breaking"/><category term="bro"/><category term="broforce"/><category term="browsers"/><category term="bruce schneier"/><category term="brute-force"/><category term="bsides SF 2017"/><category term="bug bounty"/><category term="building"/><category term="bundles"/><category term="busted"/><category term="c++"/><category term="calculation"/><category term="campaign"/><category term="can&#39;t hurt me"/><category term="capital"/><category term="captain crunch"/><category term="card editing"/><category term="carders"/><category term="care"/><category term="cartography"/><category term="cdc"/><category term="cell phone"/><category term="cellular"/><category term="ceo"/><category term="cert"/><category term="certified CyberDefender"/><category term="chainbreaker"/><category term="change management"/><category term="cheat table"/><category term="checklist manifesto"/><category term="circuit diagram"/><category term="clear text"/><category term="cli"/><category term="cliff stoll"/><category term="clone"/><category term="cloudmapper"/><category term="cmu"/><category term="code"/><category term="code signing"/><category term="cognitive bias"/><category term="cold war"/><category term="collective pentesting"/><category term="collectives"/><category term="comepition"/><category term="command line"/><category term="comment"/><category term="common cyber attacks"/><category term="common sense approach"/><category term="communications"/><category term="compression"/><category term="computer exploitation"/><category term="computer hacking"/><category term="computer network defense"/><category term="computer seizure"/><category term="con"/><category term="concent"/><category term="conference review"/><category term="conficker"/><category term="consciousness"/><category term="continuous deployment"/><category term="cookies"/><category term="coolabrative"/><category term="cooperation"/><category term="correlation attack"/><category term="cost center"/><category term="countdown to zero day"/><category term="counter"/><category term="counter hack"/><category term="counter terrorism"/><category term="cozy croissant"/><category term="crack"/><category term="crafting the infosec playbook"/><category term="cram"/><category term="crashing"/><category term="credential dump"/><category term="credential gathering"/><category term="crime"/><category term="crimedotcom"/><category term="criminal science"/><category term="criminology"/><category term="critical thinking"/><category term="cross platform"/><category term="cross site scripting"/><category term="crypto scam"/><category term="crypto war"/><category term="cryptowars"/><category term="cta"/><category term="cuckoo"/><category term="cuckoo&#39;s egg"/><category term="cudaHashCat"/><category term="cult of the dead cow"/><category term="cyber mentor"/><category term="cyber plumber"/><category term="cyber spies"/><category term="cybrary.it"/><category term="daemon"/><category term="dandridge malone"/><category term="darkweb"/><category term="data analysis"/><category term="data and goliath"/><category term="data flow diagrams"/><category term="data security"/><category term="data theft"/><category term="database"/><category term="david deutsch"/><category term="david goggins"/><category term="david talbot"/><category term="dead cells"/><category term="debreif"/><category term="debugging"/><category term="decentalized"/><category term="decentrelized"/><category term="decompile"/><category term="deconstruct"/><category term="deep packet inspection"/><category term="deep work"/><category term="def con 26"/><category term="default"/><category term="defcon 27"/><category term="defcon 32"/><category term="defender"/><category term="defensive security handbook"/><category term="delete"/><category term="deployment"/><category term="destroy"/><category term="detective"/><category term="developers"/><category term="development"/><category term="development and operations"/><category term="devil&#39;s chessboard"/><category term="digital"/><category term="digital currency"/><category term="digital identities"/><category term="digital rights"/><category term="dinobank"/><category term="dirb"/><category term="dirtycow"/><category term="disassemble"/><category term="disney"/><category term="dll"/><category term="dll injection"/><category term="docker-compose"/><category term="docs"/><category term="documentation"/><category term="domain admin"/><category term="domain controller"/><category term="door"/><category term="dox"/><category term="drive-by download"/><category term="dumping ram"/><category term="duo"/><category term="dynamic"/><category term="dynamic analysis"/><category term="dynamic library"/><category term="easy"/><category term="ebCTF"/><category term="elastic stack"/><category term="election hacking"/><category term="electric grid"/><category term="electronic badges"/><category term="empire"/><category term="energy"/><category term="engine"/><category term="enlightenment"/><category term="enterprise"/><category term="epic team adventures"/><category term="eric ries"/><category term="errata"/><category term="escalation"/><category term="ethical hacking"/><category term="ethics village"/><category term="evade"/><category term="event logs"/><category term="events"/><category term="evil"/><category term="evil dead 2"/><category term="examples"/><category term="executable"/><category term="executive"/><category term="exercise"/><category term="experience"/><category term="explanations"/><category term="exploding the phone"/><category term="exploitable"/><category term="explore"/><category term="ext4"/><category term="extreme ownership"/><category term="factfulness"/><category term="fake rce"/><category term="fakenews"/><category term="falcon force"/><category term="fallout"/><category term="fallout 4"/><category term="fallout 76"/><category term="false positives"/><category term="fast"/><category term="fastboot"/><category term="fbctf"/><category term="fdisk"/><category term="feedback"/><category term="file recovery"/><category term="file system"/><category term="find"/><category term="findstr"/><category term="firewall"/><category term="fixing the 7 fatal flaws of thinking"/><category term="flag"/><category term="flame"/><category term="flaws.cloud"/><category term="fleet management"/><category term="flipper"/><category term="flipper zero"/><category term="floppyCTF"/><category term="flow"/><category term="fls"/><category term="focus"/><category term="founder"/><category term="founders"/><category term="framework"/><category term="frauds"/><category term="free money"/><category term="fsecure"/><category term="fseventer"/><category term="ftp"/><category term="fundamentals"/><category term="funds"/><category term="future"/><category term="game boy"/><category term="game changer"/><category term="game theory"/><category term="game-changer"/><category term="gatekeeper"/><category term="general"/><category term="geoff white"/><category term="gettingintoinfosec"/><category term="ghost in the shellcode"/><category term="ghost in the wires"/><category term="gitsc"/><category term="global"/><category term="gmail"/><category term="go-netscan"/><category term="gold"/><category term="golden ticket"/><category term="gpp"/><category term="graphics"/><category term="graphs"/><category term="graphviz"/><category term="greatness"/><category term="green"/><category term="guest"/><category term="hack crack"/><category term="hack like a ghost"/><category term="hack like a god"/><category term="hack like a legend"/><category term="hack like a pornstar"/><category term="hack or hack"/><category term="hack or play"/><category term="hack_or_hack"/><category term="hack_or_play"/><category term="hacked"/><category term="hacker conference"/><category term="hacker playbook 3"/><category term="hacker valley blue"/><category term="hacking sites"/><category term="hackorhack"/><category term="hackorplay"/><category term="hackthebox.eu"/><category term="hadnagy"/><category term="handbook"/><category term="hands-on blue team exercises"/><category term="happiness"/><category term="hardware"/><category term="hardware hacking"/><category term="harry king"/><category term="hash length extension"/><category term="hash values"/><category term="hashcat"/><category term="haveibeenpwned"/><category term="header information"/><category term="hex editor"/><category term="high output management"/><category term="high security"/><category term="hijacking"/><category term="history of internet"/><category term="hitcon"/><category term="homework"/><category term="host based"/><category term="hostapd"/><category term="hotkeys"/><category term="hourglass escapes"/><category term="how to disappear"/><category term="how to hack like a pornstar"/><category term="how-to"/><category term="human"/><category term="hunt for red apples"/><category term="hxd"/><category term="hybrid"/><category term="hydra"/><category term="iDigitalFlame"/><category term="iPredator"/><category term="ibutton"/><category term="icat"/><category term="iceman"/><category term="identification"/><category term="identity"/><category term="if its smart its vulnerable"/><category term="implants"/><category term="improved"/><category term="independent"/><category term="industrial"/><category term="industroyer"/><category term="industry"/><category term="information"/><category term="information warfare"/><category term="infosec conference"/><category term="infosec pentesting"/><category term="infosec survival guide"/><category term="infrared"/><category term="innovation"/><category term="insomni&#39;hack"/><category term="instagram"/><category term="intelligence community"/><category term="intelligence operations"/><category term="internal testing"/><category term="intro"/><category term="intrusion software"/><category term="inventor"/><category term="iptables"/><category term="jamf"/><category term="jean greaves"/><category term="jean-philippe aumasson"/><category term="jock wilink"/><category term="joe rogan"/><category term="john draper"/><category term="john the ripper"/><category term="joke post"/><category term="jonathan lee"/><category term="jonathan villareal"/><category term="joseph menn"/><category term="joy bubbles"/><category term="jumbo patch"/><category term="katie hafner"/><category term="kerberos"/><category term="kernel extensions"/><category term="kevin mitnick"/><category term="kevin poulson"/><category term="key logger"/><category term="keychain"/><category term="keyloggers"/><category term="kim zetter"/><category term="kingdom of cats"/><category term="kitkat"/><category term="kon-boot"/><category term="krbtgt"/><category term="ladislav bittman"/><category term="las vegas"/><category term="launch agents"/><category term="launch deamons"/><category term="lavalink"/><category term="law enforcement"/><category term="laws"/><category term="layout"/><category term="lbc"/><category term="le bonbon croissant"/><category term="leaders"/><category term="leaders eat last"/><category term="lean startup"/><category term="learn"/><category term="lecture"/><category term="leetspeak"/><category term="leif babin"/><category term="license"/><category term="license.txt"/><category term="lie"/><category term="lifecycle"/><category term="lintile"/><category term="lists"/><category term="live blog"/><category term="live updates"/><category term="livectf"/><category term="lobbycon"/><category term="local file inclusion"/><category term="lock"/><category term="lock picking"/><category term="lockboxx"/><category term="lockpicking"/><category term="lockpicks"/><category term="logic analyzer"/><category term="logisim"/><category term="logs"/><category term="los angles"/><category term="lua"/><category term="lying"/><category term="magic"/><category term="magnet"/><category term="maksik"/><category term="malicious"/><category term="mandiant"/><category term="manufacturing"/><category term="mar rogers"/><category term="markets"/><category term="massive"/><category term="mathwhiz"/><category term="max butler"/><category term="max vision"/><category term="md5"/><category term="meaning"/><category term="meetup"/><category term="memo"/><category term="mental fortitude"/><category term="meow wolf"/><category term="meta"/><category term="meta account"/><category term="meta tags"/><category term="metal detector"/><category term="metal slug x"/><category term="meteor"/><category term="methodology"/><category term="metrics"/><category term="micromdm"/><category term="mimikatz"/><category term="mint your own money"/><category term="miscreated"/><category term="misinformation"/><category term="mmls"/><category term="mods"/><category term="monitoring"/><category term="monitors"/><category term="mono"/><category term="monopoly"/><category term="monster train"/><category term="motivation"/><category term="movement"/><category term="movie"/><category term="munki"/><category term="musicbot"/><category term="mvp"/><category term="nash equilibrium"/><category term="national defense"/><category term="nationalcptc"/><category term="necrodancer"/><category term="neo4j"/><category term="netstat"/><category term="network attacks and exploitation"/><category term="network based"/><category term="new osx book"/><category term="newosxbook"/><category term="newsletter"/><category term="ngpew"/><category term="nick cano"/><category term="nicole perlroth"/><category term="nintendo"/><category term="nishang"/><category term="no starch press"/><category term="no tech hacking"/><category term="node"/><category term="nodejs"/><category term="non-interactive"/><category term="noninteractive"/><category term="ntp"/><category term="o5logon"/><category term="ocean lotus"/><category term="oculus"/><category term="omescape"/><category term="onion routing"/><category term="online"/><category term="online behavioral advertising"/><category term="open security training"/><category term="open source intelligence"/><category term="operating systems"/><category term="operational security"/><category term="operator"/><category term="opportunity"/><category term="oracle-brute-stealth"/><category term="orange"/><category term="osquery"/><category term="osxpmem"/><category term="package"/><category term="packet hacking village"/><category term="pacu"/><category term="paid lesson"/><category term="pandemic"/><category term="paramerized queries"/><category term="pass the ticket"/><category term="passcode cup"/><category term="path"/><category term="payloads"/><category term="peacemaker"/><category term="pen testing"/><category term="penetration test"/><category term="pentest dropbox"/><category term="pentest report"/><category term="pentester night school"/><category term="permanent record"/><category term="phishing kits"/><category term="phishtank"/><category term="phone phreaking"/><category term="php object injection"/><category term="phreaking"/><category term="physical assessment"/><category term="physical pentesting"/><category term="pi"/><category term="picoCTF"/><category term="pillage"/><category term="pkg"/><category term="plaintext"/><category term="plan"/><category term="planning"/><category term="plants"/><category term="playbook"/><category term="playing to the edge"/><category term="plist"/><category term="pmapper"/><category term="pocorgtfo"/><category term="police"/><category term="polyglot"/><category term="positivity"/><category term="post mortem"/><category term="postfix"/><category term="prepare"/><category term="prepared"/><category term="prepared statements"/><category term="prevention"/><category term="principles of adversarial operations"/><category term="prisoners dilemma"/><category term="privilege escalate"/><category term="privilege escalation"/><category term="privilege mapper"/><category term="process injection"/><category term="professionals"/><category term="profile"/><category term="profiles"/><category term="program security"/><category term="project"/><category term="proof of concept"/><category term="proof of concept or get the fuck out"/><category term="propaganda"/><category term="proto-hack"/><category term="prowler"/><category term="proxy"/><category term="psychology"/><category term="puzzle"/><category term="pyschology"/><category term="python 3.3"/><category term="qbot"/><category term="quackbot"/><category term="qualifiers"/><category term="quality control"/><category term="questions"/><category term="r2"/><category term="radio"/><category term="radius"/><category term="raising"/><category term="raphi"/><category term="rapid release"/><category term="rc"/><category term="read"/><category term="reader"/><category term="reading"/><category term="ready player one"/><category term="real escape game"/><category term="realescapegame"/><category term="realistic"/><category term="red"/><category term="red balloon security"/><category term="red team into"/><category term="redballoonsecurity"/><category term="reframing"/><category term="regionals"/><category term="remediation"/><category term="remote"/><category term="remote management"/><category term="report"/><category term="reporters"/><category term="reputation tracking"/><category term="resiliency"/><category term="respond"/><category term="responders dilemma"/><category term="responders fallacy"/><category term="reviews"/><category term="rfid"/><category term="risk assessment"/><category term="risk centric approach"/><category term="robert cialdini"/><category term="robert clark"/><category term="robo-dialers"/><category term="rockstars"/><category term="roguebook"/><category term="root cause"/><category term="rootkits"/><category term="rouge"/><category term="rpg"/><category term="rule"/><category term="run"/><category term="run books"/><category term="ryan haley"/><category term="ryptic"/><category term="saleae"/><category term="salted-sha512-pbkdf2"/><category term="saltstack"/><category term="sam curry"/><category term="sandworm"/><category term="sanitizing data"/><category term="save edit"/><category term="save file"/><category term="save the net"/><category term="sci fi"/><category term="scoring"/><category term="screenshot"/><category term="searching"/><category term="seattle escape games"/><category term="security awareness"/><category term="security engineers"/><category term="security onion"/><category term="security principles"/><category term="security program"/><category term="security through obscurity"/><category term="security tube"/><category term="security with go"/><category term="seize"/><category term="sentinel"/><category term="serial port"/><category term="serious cryptography"/><category term="service model"/><category term="shaping"/><category term="shell coding"/><category term="shellcon"/><category term="shimming"/><category term="shortcuts"/><category term="show"/><category term="sign"/><category term="silicon valley"/><category term="silkroad"/><category term="silverman"/><category term="simon sinek"/><category term="single sign on"/><category term="situational awareness"/><category term="skimming"/><category term="slay the spire"/><category term="sleuth kit"/><category term="slopware"/><category term="small unit"/><category term="smart grid"/><category term="sneakers"/><category term="snort"/><category term="snowden"/><category term="social engineer"/><category term="software"/><category term="software engineering"/><category term="solved"/><category term="soupnazi"/><category term="spark notes"/><category term="spark of resistance"/><category term="speaker"/><category term="speed"/><category term="speedrun"/><category term="spy schools"/><category term="sqlite3"/><category term="srm"/><category term="ssl pinning"/><category term="stack"/><category term="startup items"/><category term="static"/><category term="statistics"/><category term="stealth war"/><category term="steve wozniak"/><category term="sticky keys"/><category term="stopping"/><category term="stress kills"/><category term="strike plate"/><category term="study"/><category term="stunt hacking"/><category term="suites"/><category term="surveillance"/><category term="survival"/><category term="swampCTF"/><category term="switch"/><category term="sysinternals"/><category term="system32"/><category term="tagmo"/><category term="tainted grail"/><category term="take over"/><category term="teaching"/><category term="team"/><category term="team lead"/><category term="team server"/><category term="teamwork"/><category term="teaser"/><category term="technical writting"/><category term="technician"/><category term="template"/><category term="test"/><category term="the 5th domain"/><category term="the beginning of infinity"/><category term="the darkness II"/><category term="the fifth domain"/><category term="the georgetown morgue"/><category term="the lean startup"/><category term="the psychology of persuasion"/><category term="the user account you are operating under does not have permission to disable this task."/><category term="the-backdoor-factory"/><category term="theft"/><category term="thehackerscrew"/><category term="thief"/><category term="thieves"/><category term="think like a hacker"/><category term="this is how they tell me the world ends"/><category term="threacare"/><category term="threat"/><category term="threat actor"/><category term="threat centric approach"/><category term="threat hunting"/><category term="threat simulation"/><category term="tit for tat"/><category term="toctou"/><category term="toxicology"/><category term="trade craft"/><category term="traffic"/><category term="traffic analysis"/><category term="tragedy of the commons"/><category term="transparency"/><category term="travis bradberry"/><category term="trends"/><category term="triage time"/><category term="tribe of hackers"/><category term="tricks"/><category term="troll"/><category term="trust"/><category term="tum"/><category term="uart"/><category term="ubeeri"/><category term="udp"/><category term="unbaised"/><category term="underground"/><category term="unity"/><category term="universal"/><category term="universities"/><category term="unrestricted release"/><category term="usb forensics"/><category term="uscc"/><category term="vault"/><category term="vendors"/><category term="verify"/><category term="version 4"/><category term="victim"/><category term="video"/><category term="violent python"/><category term="viper"/><category term="virtual box"/><category term="virtual reality"/><category term="visualizations"/><category term="visualize"/><category term="vm"/><category term="vms"/><category term="volafox"/><category term="volume 1"/><category term="volunteering"/><category term="waledac"/><category term="war"/><category term="war games"/><category term="warden"/><category term="watering hole"/><category term="web directories"/><category term="weirdAAL"/><category term="what got you here won&#39;t get you there"/><category term="where wizards stay up late"/><category term="whistle blower"/><category term="white listing"/><category term="white paper"/><category term="who"/><category term="wifi"/><category term="wifite"/><category term="wii"/><category term="wil allsopp"/><category term="winning"/><category term="winning the brain game"/><category term="wiper"/><category term="wireless profiles"/><category term="work in progress"/><category term="workspace"/><category term="writing"/><category term="wwg1wga"/><category term="x64"/><category term="x86"/><category term="xcape"/><category term="xkcd"/><category term="yellow"/><category term="zelda"/><category term="zine"/><title type='text'>LockBoxx</title><subtitle type='html'>A Hacker&#39;s Blog</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>683</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8182295589560393232</id><published>2026-05-18T15:38:01.132-07:00</published><updated>2026-05-18T15:38:59.721-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="newsletter"/><title type='text'>Lockboxx Infosec Newsletter!</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnRLmRsH22pCv7-0BOBNnQ36RZscw2EFtMEmJ2s4S6bpaYlfvD00VnvChhL0AmaTiJrmDVLDsq_Y6Gf_5EYQbeVzFoBUNdvS0-Cmy16pfquTMWRLpgpmx-S9EAxYEBtJL4wech_vRp2Hbxdxi0MmsPsrrh40G-87oti5YKDOvpaPbFvCgiPLbZspS4BvI8/s1125/cyber_banner.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;1125&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnRLmRsH22pCv7-0BOBNnQ36RZscw2EFtMEmJ2s4S6bpaYlfvD00VnvChhL0AmaTiJrmDVLDsq_Y6Gf_5EYQbeVzFoBUNdvS0-Cmy16pfquTMWRLpgpmx-S9EAxYEBtJL4wech_vRp2Hbxdxi0MmsPsrrh40G-87oti5YKDOvpaPbFvCgiPLbZspS4BvI8/w640-h288/cyber_banner.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Thanks again to all my loyal readers. I really appreciate any one who reads this blog.&lt;/p&gt;
&lt;p&gt;One thing that keeps coming up is just how much garbage news you have to sift through to stay current in security. Every day there’s a new breach, new vuln, new vendor hype cycle, or someone rediscovering a technique from 2017 and calling it revolutionary. To help with all of that noise, I started a security newsletter.&lt;/p&gt;
&lt;p&gt;The idea is pretty simple. Curated infosec news, filtered by me, with an emphasis on things operators, engineers, defenders, and people working in the trenches will actually care about. Less noise, more signal. Things that are useful, interesting, or worth paying attention to before they become everyone’s problem.&lt;/p&gt;
&lt;p&gt;If you want a cleaner feed of cutting edge security news without spending hours doomscrolling, you might get something out of this. You can check it out and subscribe here:&lt;/p&gt;
&lt;p&gt;&lt;span data-state=&quot;closed&quot;&gt;&lt;a href=&quot;https://seclist.lockboxx.org/&quot;&gt;SecList by LockBoxx&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;If you sign up, hopefully it earns that spot in your inbox.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/8182295589560393232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8182295589560393232' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8182295589560393232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8182295589560393232'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/05/lockboxx-infosec-newsletter.html' title='Lockboxx Infosec Newsletter!'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnRLmRsH22pCv7-0BOBNnQ36RZscw2EFtMEmJ2s4S6bpaYlfvD00VnvChhL0AmaTiJrmDVLDsq_Y6Gf_5EYQbeVzFoBUNdvS0-Cmy16pfquTMWRLpgpmx-S9EAxYEBtJL4wech_vRp2Hbxdxi0MmsPsrrh40G-87oti5YKDOvpaPbFvCgiPLbZspS4BvI8/s72-w640-h288-c/cyber_banner.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4146842550400222920</id><published>2026-05-16T08:59:55.757-07:00</published><updated>2026-05-16T08:59:55.757-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="NCCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="new york times"/><category scheme="http://www.blogger.com/atom/ns#" term="NYT"/><category scheme="http://www.blogger.com/atom/ns#" term="reporters"/><title type='text'>The New York Times Watched Us Run Cyber Ops for Two Days</title><content type='html'>&lt;p&gt;This year at NCCDC was strange in a way I do not think I fully appreciated until afterward. For two days, while we were running offensive operations against some of the best collegiate defenders in the country, the New York Times was sitting in the room with us. Watching. Asking questions. Trying to understand why half a dozen people would voluntarily spend months building custom malware, agent frameworks, and infrastructure just to stress test students in a national competition. You see the &lt;a href=&quot;https://www.nytimes.com/2026/05/12/technology/ai-cybersecurity-competition.html&quot;&gt;NYT article here&lt;/a&gt;, or &lt;a href=&quot;https://archive.is/GzKU9&quot;&gt;read the free archive here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Not only that, but we were in the penthouse suite of the Cosmo, eating the best meals, and hacking at poolside cabanas when we weren&#39;t in the room. The suite looked exactly like what people imagine offensive security operations look like. Giant wall displays covered in telemetry. Attack infrastructure sprawled across tables. Music running nonstop. Guys fully immersed in the matrix wearing Apple Headsets. Operators shouting across the room, coordinating attacks, while reporters and photographers moved between clusters of laptops and cables running from table to table. If Hollywood designed a cyber operations center, it probably would have looked pretty close to our red team room this year.&lt;/p&gt;&lt;p&gt;One thing I appreciated about working with Cade over the interviews leading into the event was that he seemed genuinely interested in the operational reality rather than forcing everything into a predetermined narrative. What happened in the room was experienced operators using increasingly strange tools to move faster under pressure. For two days there were reporters from the New York Times sitting inside that ecosystem while some of the best operators I know showed them what did we normally do. I love NCCDC because we really go all out building tools, testing ideas, arguing about the infrastructure, then battle testing our ideas against some of the brightest in the Nation.&lt;/p&gt;&lt;p&gt;The agentic systems helped a lot. They also failed a lot. Sometimes within minutes of each other. That nuance matters. The agentic systems still do extremely strange, often unhinged things. But their value is obvious striking that balance is the golden mixture many people are chasing right now. After extensive testing I think it looks a little more like traditional automation, that calls out to LLMs as part of it&#39;s automation routines. This is of course opposed the claudbot or multi-agent approach that we see a lot of currently.&amp;nbsp;&lt;/p&gt;&lt;p&gt;To most people, a Vegas penthouse full of operators coordinating cyber attacks while journalists take notes would probably sound like fiction. By day two, for us, it was just the same war-game that we love to play. Because from the inside, after enough years, spending a weekend in a Vegas suite coordinating cyber attacks starts to feel very normal.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwB7g5q0K1X_Xu2HnZy6V7xJOzEU9CGg4hpxxwIXZSn205fgUz8bLqZHXus7fl_vr4ilsvI7nZ7A2Tx3Mq5uGBRiaHmgFDhLIPm7nDJQFQP89h6aVs8Z6dEKh4hDlAe3fmBdlEJxubZdyyGyBY27_MIfq00QClbGEUB-O0p5-uYNcOIUaAL6JSJr4Bn8_j/s1672/goblin_hacker_party.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;An artistic representation of my Agentic Goblin Swarm, hanging out in our suite&quot; border=&quot;0&quot; data-original-height=&quot;941&quot; data-original-width=&quot;1672&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwB7g5q0K1X_Xu2HnZy6V7xJOzEU9CGg4hpxxwIXZSn205fgUz8bLqZHXus7fl_vr4ilsvI7nZ7A2Tx3Mq5uGBRiaHmgFDhLIPm7nDJQFQP89h6aVs8Z6dEKh4hDlAe3fmBdlEJxubZdyyGyBY27_MIfq00QClbGEUB-O0p5-uYNcOIUaAL6JSJr4Bn8_j/w640-h360/goblin_hacker_party.png&quot; title=&quot;An artistic representation of my Agentic Goblin Swarm, hanging out in our suite&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4146842550400222920/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4146842550400222920' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4146842550400222920'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4146842550400222920'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/05/the-new-york-times-watched-us-run-cyber.html' title='The New York Times Watched Us Run Cyber Ops for Two Days'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwB7g5q0K1X_Xu2HnZy6V7xJOzEU9CGg4hpxxwIXZSn205fgUz8bLqZHXus7fl_vr4ilsvI7nZ7A2Tx3Mq5uGBRiaHmgFDhLIPm7nDJQFQP89h6aVs8Z6dEKh4hDlAe3fmBdlEJxubZdyyGyBY27_MIfq00QClbGEUB-O0p5-uYNcOIUaAL6JSJr4Bn8_j/s72-w640-h360-c/goblin_hacker_party.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8728682689854224482</id><published>2026-05-15T07:23:59.493-07:00</published><updated>2026-05-15T07:28:34.921-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Rick Howard"/><category scheme="http://www.blogger.com/atom/ns#" term="security principles"/><title type='text'>Book Review: &quot;Cybersecurity First Principles&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7m7CFol9zfxu1mPaPmfwHIBSnFkfae3QOUB1HRKz74_QZgCYv7pAcH-I9O4oQZCQbWAhplYemnFYG3DOdwqLqHRRXgbeH5LGgF6sPicBeApICs3l5ZUHZc7aJtDTfOT5pj7XM8ftkEtaOkka0ZQMYwoQvySYlDjjStDqq2lUXyHQkVfWcErH2JCwAab5b/s1200/CyberSecurity_FirstPrinciples.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1200&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7m7CFol9zfxu1mPaPmfwHIBSnFkfae3QOUB1HRKz74_QZgCYv7pAcH-I9O4oQZCQbWAhplYemnFYG3DOdwqLqHRRXgbeH5LGgF6sPicBeApICs3l5ZUHZc7aJtDTfOT5pj7XM8ftkEtaOkka0ZQMYwoQvySYlDjjStDqq2lUXyHQkVfWcErH2JCwAab5b/w640-h640/CyberSecurity_FirstPrinciples.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&quot;Cybersecurity First Principles: A Reboot of Strategy and Tactics&quot; by Rick Howard is a splendid attempt to boil down what is &quot;cybersecurity&quot; at it&#39;s fundamental level, and what are some core strategies for achieving this. If you are like me, you are probably very curious what these &lt;i&gt;First Principles&lt;/i&gt;&amp;nbsp;actually are, and you might be surprised to learn this is only one:&amp;nbsp;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p&gt;&quot;Reduce the probability of a material impact due to a cyber event over the next three years.&quot;&lt;/p&gt;&lt;/blockquote&gt;I paid $15 for a hard copy of the book and breezed through it in a few days. It reads very easy and is choc full of resources and links, exactly my kind of book. Overall I give this 7 out of 10 stars, for being phenomenally well researched and grounded in it&#39;s philosophy, albeit a little high-level for practitioners. The book is full of old references to philosophy and military strategy, so it&#39;s immediately the kind of book I love digging through and following the references. That said, I had to give it slightly less stars because at times some of the wording feels very AI written and is thus hard to read for long periods of time. Even so I found the book really thought provoking, and constantly pushing me to ask, &quot;is this a principle? what if we made it more generic?&quot; Regardless of what I think are security principles, the following are all of the chapters of the book:&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;Chapter 1 — First Principles&lt;/div&gt;&lt;div&gt;Chapter 2 — Strategies&lt;/div&gt;&lt;div&gt;Chapter 3 — Zero Trust&lt;/div&gt;&lt;div&gt;Chapter 4 — Intrusion Kill Chain Prevention&lt;/div&gt;&lt;div&gt;Chapter 5 — Resilience&lt;/div&gt;&lt;div&gt;Chapter 6 — Risk forecasting&lt;/div&gt;&lt;div&gt;Chapter 7 — Automation&lt;/div&gt;&lt;div&gt;Chapter 8 — Summation&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As the chapters lay out, after the First Principle chapter, Chapter 2 covers the strategies from a high level, then Chapters 3 - 5 are the literal strategies for pursuing the First Principle. This felt a little redundant to me, like Chapter 2 could have easily been rolled into the intro. The Zero Trust chapter is also useful because Howard refuses to let it be a product category. He treats it as architectural posture. assume breach, segment aggressively, authenticate every transaction, which is what the original framing always was. He references several cool things like the NIST design and original paper. But the chapter also veers off into vuln management and several other topics. When we get to the chapter on the Intrusion Kill Chain Prevention strategy, the comparison I keep coming back to is my own book, &lt;em data-end=&quot;94&quot; data-start=&quot;53&quot;&gt;Adversarial Tradecraft in Cybersecurity&lt;/em&gt;. Howard and I are really saying the same thing from different angles. In my book, I walk through each stage of an attack and ask what the attacker is doing, how defenders can disrupt it, and what the attacker is forced to do next if that disruption works. That naturally leads to the same conclusion Howard reaches from the boardroom. The best security investments are the ones that interrupt attackers early and at the key choke points where adapting becomes harder, louder, and easier to detect. The Resilience and Automation chapters are a little unfocused in my opinion. Using examples like Netflix&#39;s Chaos Monkey or Google&#39;s tech strategy is a little too lofty, scattered, and expensive for a normal person. Those practices emerged from organizations with mature distributed architectures and extensive engineering investment. Most security teams operate under radically different constraints, making the translation from principle to implementation less obvious. Lastly, the Risk Forecasting chapter is probably one of my favorite. I love the throwbacks to &quot;How to Measure Anything in Cybersecurity Risk&quot; as well as the use of Bayes Alogorythm. Overall, I really enjoyed the book as it made me think deeply about various aspects of cyber strategy. Below you can see Rick Howard and G Mark discus a bunch of the strategies and approaches in the book:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;qMYqUG_convSearchResultHighlightRoot&quot;&gt;&lt;div class=&quot;relative w-full overflow-visible&quot;&gt;&lt;section class=&quot;text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]&quot; data-scroll-anchor=&quot;false&quot; data-testid=&quot;conversation-turn-4&quot; data-turn-id-container=&quot;request-WEB:e2363714-1b18-4713-8a95-1e52eec76771-31&quot; data-turn-id=&quot;request-WEB:e2363714-1b18-4713-8a95-1e52eec76771-31&quot; data-turn=&quot;assistant&quot; dir=&quot;auto&quot;&gt;&lt;div class=&quot;text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)&quot;&gt;&lt;div class=&quot;[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn&quot;&gt;&lt;div class=&quot;z-0 flex min-h-[46px] justify-start&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/section&gt;&lt;div class=&quot;contents&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/hWJWxdCpt3g?si=1Qdzm106DkThdJIn&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/8728682689854224482/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8728682689854224482' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8728682689854224482'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8728682689854224482'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/05/book-review-cybersecurity-first.html' title='Book Review: &quot;Cybersecurity First Principles&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7m7CFol9zfxu1mPaPmfwHIBSnFkfae3QOUB1HRKz74_QZgCYv7pAcH-I9O4oQZCQbWAhplYemnFYG3DOdwqLqHRRXgbeH5LGgF6sPicBeApICs3l5ZUHZc7aJtDTfOT5pj7XM8ftkEtaOkka0ZQMYwoQvySYlDjjStDqq2lUXyHQkVfWcErH2JCwAab5b/s72-w640-h640-c/CyberSecurity_FirstPrinciples.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7789015209177144574</id><published>2026-05-09T16:16:00.000-07:00</published><updated>2026-05-10T10:17:43.228-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adversarial"/><category scheme="http://www.blogger.com/atom/ns#" term="attack"/><category scheme="http://www.blogger.com/atom/ns#" term="attack and defense"/><category scheme="http://www.blogger.com/atom/ns#" term="CCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="NCCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="offense"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Teaming"/><category scheme="http://www.blogger.com/atom/ns#" term="trade craft"/><title type='text'>Red Teaming at NCCDC 2026</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRLUl5yTO5_PsPtlNvA5GIeEFxR7tPe4hTeMUJeJtIwLNbHIFn2az_qpCyYqSiy3nfnAqjvaAnlE9y7JWZrZnYoQVqOeAv5sHqctV0MdEpPy94mp2GeuEf-oSQm6ecYhB2kegppBO9YTI1iFjTPP3zYPsj7zoM5Iky3ZYz77i10fPuLHzBlVe2acL_-7vY/s1200/NCCDC2026Logo.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;675&quot; data-original-width=&quot;1200&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRLUl5yTO5_PsPtlNvA5GIeEFxR7tPe4hTeMUJeJtIwLNbHIFn2az_qpCyYqSiy3nfnAqjvaAnlE9y7JWZrZnYoQVqOeAv5sHqctV0MdEpPy94mp2GeuEf-oSQm6ecYhB2kegppBO9YTI1iFjTPP3zYPsj7zoM5Iky3ZYz77i10fPuLHzBlVe2acL_-7vY/w640-h360/NCCDC2026Logo.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This year was one of the best &lt;a href=&quot;https://nationalccdc.org/about.html&quot;&gt;NCCDC&lt;/a&gt; events I&#39;ve ever played in. The environment was good. The blue teams were top-notch. The red team had new tools, old friends, and some killer 0day. Nearly every match-up turned into a long-form operational dogfight instead of a quick pop and dominate. The final standings ended up being:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;1st place: Dakota State University&lt;br /&gt;&lt;/li&gt;&lt;li&gt;2nd place: University of Virginia&lt;br /&gt;&lt;/li&gt;&lt;li&gt;3rd place: Western Washington University&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;First I need to mention how sick the environment and our tooling was this year. Alex also &lt;a href=&quot;https://alexlevinson.wordpress.com/2026/04/30/nccdc-2026-same-game-new-dimensions/&quot;&gt;writes about it here&lt;/a&gt;, but essentially it was a water treatment plant themed around some lovable pocket monsters.&amp;nbsp;The infrastructure felt believable, the ICS components were integrated well, and the whole thing had a ton of personality. On top of that, White Team did something incredibly interesting this year. Going into the competition, we told them we planned to bring some legitimate 0day research targeting ESXi infrastructure. Rather than turning the event into an uncontrolled hypervisor bloodbath, White Team worked with the red team to create a controlled implant prebaked into the environment itself. Instead of live exploitation, we had an evenly deployed, pre-planted ESXi management backdoor that teams were gradually made aware of through threat intelligence notifications and environmental clues during play. It took our normal ESXi exploitation and evenly applied it to all teams, rather than cursing just a specific few teams with a significantly harder experience. Don’t get me wrong, this was very much a &#39;final-boss-level&#39; computer security problem to hand blue teams. But this is Nationals, and part of the fun is keeping the threats fresh, forcing teams to deal with problems they probably have not seen before, and making sure the environment evolves beyond the standard “reset passwords and block SMB” playbook.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGLwGZfpBkwqysScroVar479-4C0aD85yvkFzZf6FKRl-TNyOF3k8xkOEC8Q25LSXpq_1AX-xlan_TPzKM0n7bUOhDZMgt3W3B_CILhs4i7JNOWJcJo7iiAeARNvLHdiOP83AcMrHcRY2TFveDjjj5kNe1R5jeG9pJ1eopdbRggWhc2TWC0XdVq13qqeHx/s3108/Screenshot%202026-04-25%20at%201.30.46%E2%80%AFPM.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1696&quot; data-original-width=&quot;3108&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGLwGZfpBkwqysScroVar479-4C0aD85yvkFzZf6FKRl-TNyOF3k8xkOEC8Q25LSXpq_1AX-xlan_TPzKM0n7bUOhDZMgt3W3B_CILhs4i7JNOWJcJo7iiAeARNvLHdiOP83AcMrHcRY2TFveDjjj5kNe1R5jeG9pJ1eopdbRggWhc2TWC0XdVq13qqeHx/w640-h350/Screenshot%202026-04-25%20at%201.30.46%E2%80%AFPM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This year I was up against University of Central Florida (UCF), which continues to be one of the strongest CCDC teams in the country. They have an incredible program there and always present a serious challenge to the red team. UCF brings real operational maturity and professional grade tools to the competition. They come prepared with a defensive strategy that evolves throughout the event and involves adversarial strategy comparable to the red teams. They are one of the few teams that consistently adapts to the red team during play. This year was no different and I really love playing that game (it&#39;s rare). I actually figured out it was them during the competition because the epic tooling they bring comes with it&#39;s own mascot as well, SnoopyOnSecurity. They brought custom tooling including Red Baron 2, a proprietary Linux EDR-style agent that was actively identifying persistence, removing backdoors, and feeding telemetry back to defenders. They also deployed increasingly aggressive network monitoring stack known as Peanuts. As the event progressed, Peanuts passivly monitored most red team access then on day two they did a big flip to kick us out of scored services and shutdown our various c2 channels. At multiple points during the event they effectively changed the shape of the battlefield using their Palo Alto. Their ability to adapt operationally throughout the event was impressive. Most teams either collapse immediately or bunker permanently. UCF actively evolved throughout the engagement to monitor and respond to us. They hardened aggressively, deployed custom detection logic, constrained attacker movement, and thus forced the red team into progressively narrower operational paths.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEi2D9ceaDDcifSkJ1kmwPzHx5oB8ncdYtdUzUtMZ-eQ1QU9SDUmvI6o-7YSDw3pD9D8my8epc3QMHNZUwHAzBUL12xnblkJ-erGK0ECmM480IsGmf4vx4ws7BOa0zFOGqhR9uGCIgHFH2zthslEo8DKxo5LTxHPkVEfiJXvCuqtjx9bQTots5g8uHptVxI5&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;1116&quot; data-original-width=&quot;1416&quot; height=&quot;504&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEi2D9ceaDDcifSkJ1kmwPzHx5oB8ncdYtdUzUtMZ-eQ1QU9SDUmvI6o-7YSDw3pD9D8my8epc3QMHNZUwHAzBUL12xnblkJ-erGK0ECmM480IsGmf4vx4ws7BOa0zFOGqhR9uGCIgHFH2zthslEo8DKxo5LTxHPkVEfiJXvCuqtjx9bQTots5g8uHptVxI5=w640-h504&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p data-end=&quot;5039&quot; data-start=&quot;4798&quot;&gt;While the dogfight over the individual machines continued, what actually sunk the team was the damage we were able to do their OT systems.&amp;nbsp;They spent a ton of their time hardening their traditional &quot;general computing&quot; environment, but left their SCADA water treatment systems generally exposed throughout the life the competition.&amp;nbsp;There were multiple paths into SCADA infrastructure including exposed Grafana instances, Node-RED deployments, MQTT brokers with anonymous access enabled, and just straight Modbus TCP devices with no authentication. Once access was established, operational impact became straightforward and devestating. Grafana service account tokens survived password rotation and allowed extraction of SCADA telemetry through the proxy interface.  Node-RED provided command execution through malicious flow deployment. MQTT retained messages allowed persistent manipulation of the systems. And the Modbus infrastructure was particularly fragile. Several PLCs exposed unauthenticated register writes over port 1502. Continuous manipulation scripts were looped that repeatedly overwrote flow rate, chlorine values, pressure readings, pH, turbidity, and alarm states. What&#39;s even more wild is that Claude agents drove many of these OT attacks, showing that commercially available models are more than ready to attack critical infrastructure systems, given the right pretense.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p data-end=&quot;5808&quot; data-start=&quot;5547&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh6nR444liLvmBS3ZcCDjCKaxcfkCQQeoNFenE_yOHMJW3WPLNcUxLc7cQtt49T15KuvzJFs54owyr5eZlRfjA4BHbVUvkYW42n_T90oSXsI61n49d7AyGKu6TdEMOSKU-GJ74ZGhOKLAtN_W1k2Mjfja6gWcyoVTpv_-skTnuXkyjrNamm-G2XIi17EFo6&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;779&quot; data-original-width=&quot;1158&quot; height=&quot;430&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEh6nR444liLvmBS3ZcCDjCKaxcfkCQQeoNFenE_yOHMJW3WPLNcUxLc7cQtt49T15KuvzJFs54owyr5eZlRfjA4BHbVUvkYW42n_T90oSXsI61n49d7AyGKu6TdEMOSKU-GJ74ZGhOKLAtN_W1k2Mjfja6gWcyoVTpv_-skTnuXkyjrNamm-G2XIi17EFo6=w640-h430&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Most red teams started using the Dog-Tunnel and HyperSpace access on day 2 to attack domain controllers directly, usually by targeting DNS and trying to collapse the entire environment. My team spent a significant amount of time attempting the same thing against UCF. By that point, they had applied genuinely impressive local hardening to the DC. Application controls were tighter, local firewall rules were aggressive, and most of the blind command execution we attempted failed for unknown reasons. We could touch the system, but not in a way that let us execute anything operationally significant. I also thought if I decided to revert it, it would very quickly come back to this state and risk this amazing access I had. However the team&#39;s Achilles heel was their network configuration and architecture. Their Palo Alto appliance had become the backbone of their defensive posture. It was responsible for almost all of the network monitoring, filtering, and traffic suppression that had gradually forced the red team out of the environment. They smartly rerouted many of their machines behind the in-line Palo Alto device and used this to monitor and block lots of traffic. But the fatal flaw in this design was they placed their ESXi host controller behind this firewall (apparently because of the notifications they were getting from WhiteTeam about our ESXi exploits). I was able to revert their Palo instance to an earlier snapshot through our HyperSpace backdoor and the effect was immediate. Their filtering collapsed and the environment destabilized hard. For roughly two to four hours many of their services were entirely unavailable before they eventually appeared to hard revert portions of the environment back to an earlier state, resulting in a massive point loss. I don&#39;t think this lost them the competition, but it was certainly a great way for the red team to leverage their network architecture against them. The issue was that when it failed, it failed in a way that disrupted their own ability to manage and recover the environment. The defensive stack became a dependency instead of a resilience layer, and once the center collapsed, recovery became significantly harder to near impossible due to the remote nature.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHDAC2JaVv1_hg1HGazVlJlYfxI2_FJzesy7Grs5-xOD-Am9FOff6ges3B2zaYE8EWasMgtuVNYm-mRhQlspD-a5ZkdV-7PPfXH2Y73uHvld98Uu8An2rNzbuVLrPEQZif46BIbkr3bEXmrxbRLHOm2r8ou9m919DyN8Noh_bESLZYMvn22Wq0_UCJB0wZ/s1152/Screenshot%202026-04-25%20at%205.30.54%E2%80%AFPM.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;616&quot; data-original-width=&quot;1152&quot; height=&quot;342&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHDAC2JaVv1_hg1HGazVlJlYfxI2_FJzesy7Grs5-xOD-Am9FOff6ges3B2zaYE8EWasMgtuVNYm-mRhQlspD-a5ZkdV-7PPfXH2Y73uHvld98Uu8An2rNzbuVLrPEQZif46BIbkr3bEXmrxbRLHOm2r8ou9m919DyN8Noh_bESLZYMvn22Wq0_UCJB0wZ/w640-h342/Screenshot%202026-04-25%20at%205.30.54%E2%80%AFPM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;I took a big experiment this year using an agentic swarm I made using a custom harness. I took a ton of my old techniques, broke them in agents, then fed the agents rules and skill files dynamically based on the task. I orchestrated them naively through tmux and a flat csv file system to start, which actually worked surprisingly well. I&#39;m working on new versions now that use databases and message queues. It&#39;s super strange because it does make some stuff faster but also many normal operations can be slower. I brought a fairly mature CCDC-focused agent swarm framework into the competition. The system was designed around distributed operational assistance rather than full autonomy. Agents handled repetitive enumeration, credential validation, persistence verification, pathfinding, and operational state tracking while I focused on higher-order decisions. In some ways it worked incredibly well. The agents dramatically accelerated:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;credential spraying&lt;/li&gt;&lt;li&gt;service validation&lt;/li&gt;&lt;li&gt;host categorization&lt;/li&gt;&lt;li&gt;persistence verification&lt;/li&gt;&lt;li&gt;privilege escalation&lt;/li&gt;&lt;li&gt;operational documentation&lt;/li&gt;&lt;li&gt;environment mapping over time&lt;/li&gt;&lt;li&gt;web app exploitation&lt;/li&gt;&lt;li&gt;familiarity with lesser known systems&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;But the tradeoffs were real. Agentic systems introduce latency in places where experienced operators normally move instinctively. There is overhead in task routing, tokenization, querying a network service, querying an llm, result validation, and state synchronization. During the first few minutes of competition that overhead matters a lot. The result is a strange paradox. The system makes you simultaneously faster in some ways and slower in others. I think you are faster operationally across multi-hour engagements where rapid parallelization is required. However the longer the agents run the more they lose their original context and become more &quot;unhinged&quot;. After running for several hours, they seemed to have lost track of their original agent files and thus true purpose, and the agents began drifting into one anothers&#39; lanes. At one point, one of the agents even tried to execute some malware locally, but due to the sandboxing it was ineffective. The agents are also a lot slower tactically in the first moments of exploitation. Particularly, if you already know exactly what you want to do, then traditional automation works a lot better in many places. Essentially, while I think the agentic claude-code loop of an agent driving operations feels good, it is probably not the right long-term engineering solution. Rather, I think the more mature solution actually looks like traditional software kill-chain automation (think metasploit), that just queries an LLM when it needs to, rather than giving the agentic swarm more control. I almost certainly will follow up on these agentic thoughts soon in another post, but I wanted to get some of early operational thoughts down here.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRVeJ6UqRHERYYc4UfOaTgtcY0bh8BZur1dP9fHRrUoX2IdOxixzFEYZORHr0SwLEaxrBh2ZjULk4aZ-VbtFWh8pcDBdIKovRBQuICmQXIzIBexfrdacafW2zYLAuYX2lC03d602mtkS4Ep4J4UuqlWEkfZwGt5uK94LUwZp0jczb-DPaFkQoGgW6Y5Lo/s2280/PC-Problems.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1492&quot; data-original-width=&quot;2280&quot; height=&quot;418&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRVeJ6UqRHERYYc4UfOaTgtcY0bh8BZur1dP9fHRrUoX2IdOxixzFEYZORHr0SwLEaxrBh2ZjULk4aZ-VbtFWh8pcDBdIKovRBQuICmQXIzIBexfrdacafW2zYLAuYX2lC03d602mtkS4Ep4J4UuqlWEkfZwGt5uK94LUwZp0jczb-DPaFkQoGgW6Y5Lo/w640-h418/PC-Problems.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/7789015209177144574/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7789015209177144574' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7789015209177144574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7789015209177144574'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/05/red-teaming-at-nccdc-2026.html' title='Red Teaming at NCCDC 2026'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRLUl5yTO5_PsPtlNvA5GIeEFxR7tPe4hTeMUJeJtIwLNbHIFn2az_qpCyYqSiy3nfnAqjvaAnlE9y7JWZrZnYoQVqOeAv5sHqctV0MdEpPy94mp2GeuEf-oSQm6ecYhB2kegppBO9YTI1iFjTPP3zYPsj7zoM5Iky3ZYz77i10fPuLHzBlVe2acL_-7vY/s72-w640-h360-c/NCCDC2026Logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7007484319189803874</id><published>2026-05-02T18:25:00.000-07:00</published><updated>2026-05-02T18:48:55.208-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="coaching"/><category scheme="http://www.blogger.com/atom/ns#" term="education"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="training"/><title type='text'>Infosec Training Courses Available - Train Directly With Me</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTWBOyuGtU660qg58A726iCdGuwbd0kp2vaf1jrLV1b6dgBxZxtwd-R-hS9IiDPV6sjXvPO5t4ZnZ7oSZb2Vl5xx21uaXaXWsxdCsj3xz_swTowq3O6G366JfBZ0Ls7_OngG1yvdbzLbjSUmO8RKn2-J1xXMkd9XyyGDaelYfBo2LLLJW918N5NuCTAIoh/s1983/AD_Training_Banner.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;793&quot; data-original-width=&quot;1983&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTWBOyuGtU660qg58A726iCdGuwbd0kp2vaf1jrLV1b6dgBxZxtwd-R-hS9IiDPV6sjXvPO5t4ZnZ7oSZb2Vl5xx21uaXaXWsxdCsj3xz_swTowq3O6G366JfBZ0Ls7_OngG1yvdbzLbjSUmO8RKn2-J1xXMkd9XyyGDaelYfBo2LLLJW918N5NuCTAIoh/w640-h256/AD_Training_Banner.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Hey all, I wanted to take a moment to say that I run training sessions in a variety of subjects. Not only is this an affordable way to hang out with me, it&#39;s a great way to learn a bunch of topics from me first hand. Over the years I’ve had the opportunity to work across offensive security, detection engineering, purple teaming, security engineering, large scale corporate engineering, AI systems, and competitive cyber operations. I’ve decided to open up a limited number of direct training engagements to the public, for those that want practical, hands-on instruction from someone with some deep experience in the field.&lt;/p&gt;&lt;p&gt;I offer both in-person and remote training sessions designed around real operational experience, not recycled certification material or generic slide decks. I&#39;ve lead word class red team operations against fortune 100 companies and I&#39;ve gotten real attackers indicted. I&#39;ve presented to the board and testified in front of a grand jury on a cyber incident. I have a wide swath of experience with large corporate engineering challenges.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I’m also the author of the bestselling cybersecurity book Adversarial Tradecraft in Cybersecurity, which focuses on modern offensive and defensive techniques refined through real-world network operations and adversarial tradecraft. not only that but I&#39;m working on a new book titled AI Security Engineering that applies decade old security learnings to new LLM powered systems in a large corporate eningeering context.&amp;nbsp;&lt;/p&gt;&lt;p&gt;All of the courses consist of the following:&lt;br /&gt;&lt;/p&gt;&lt;ul&gt;&lt;li data-end=&quot;991&quot; data-section-id=&quot;svfugn&quot; data-start=&quot;970&quot;&gt;Two 3-hour sessions&lt;/li&gt;&lt;li data-end=&quot;1024&quot; data-section-id=&quot;1qitiv6&quot; data-start=&quot;992&quot;&gt;
6 hours total instruction time
&lt;/li&gt;
&lt;li data-end=&quot;1057&quot; data-section-id=&quot;e5evh9&quot; data-start=&quot;1025&quot;&gt;
Interactive discussion and Q&amp;amp;A
&lt;/li&gt;
&lt;li data-end=&quot;1119&quot; data-section-id=&quot;1lm8o57&quot; data-start=&quot;1058&quot;&gt;
Practical workflows, tooling, and operational methodologies
&lt;/li&gt;&lt;li data-end=&quot;1119&quot; data-section-id=&quot;1lm8o57&quot; data-start=&quot;1058&quot;&gt;Building tools and solutions live to your challenges&lt;/li&gt;
&lt;li data-end=&quot;1148&quot; data-section-id=&quot;1leqp8p&quot; data-start=&quot;1120&quot;&gt;
Available online or onsite&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The idea is an in-depth session with me where we can dig into specific material relevant to either your current problems at work or skills you want to work on improving. The sessions are really designed like educational courses to help transfer several skills and workflows I&#39;ve developed over the years. The following courses are offered in either a &lt;span style=&quot;background-color: #ffe599;&quot;&gt;Basic&lt;/span&gt; or &lt;span style=&quot;background-color: #ffe599;&quot;&gt;Advanced&lt;/span&gt; versions. This is a lot of content that I have pre-canned, that I&#39;ve developed over my career, but I can easily customize or pivot any of these sessions:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Building a Vulnerability Management Program&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Building Red Teaming Capabilities&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Detection Operations in Practice&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Purple Teaming in Practice&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;How to Win at CCDC&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Building an Agentic Framework&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;AI Security Engineering&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Zero-Trust Security Engineering&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The general price is $3k* per student, per course. Prices may vary depending on the circumstance. Generally this is pricing designed for people to spend their corporate training budget but directly with me on a topic I have deep knowledge in and they are interested in. This could also be a good opportunity to spend corporate budget on some dedicated, 1:1, career coaching. One of the best parts about a training like this is we can tailor the material to exactly what you want to work on as opposed to a pre-canned course where you have to follow a conversation or program on rails. These courses are designed with some of the following groups in mind:&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Security orgs looking to level up a team&#39;s operational capability&lt;/li&gt;&lt;li&gt;Engineers transitioning into new offensive or defensive security roles&lt;/li&gt;&lt;li&gt;Engineers looking to develop a &#39;senior&#39; perspective or skill set&lt;/li&gt;&lt;li&gt;Organizations wanting tailored, expert-led training&lt;/li&gt;&lt;li&gt;Professionals using corporate education or training budgets&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;If you are interested in a course like this you can email me at: &lt;span style=&quot;background-color: #b6d7a8;&quot;&gt;training@lockboxx.org&amp;nbsp;&lt;br /&gt;&lt;/span&gt;* These prices are subject to change based on demand and circumstance&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgafGqCz6g6jTtYcnjxG7FsACLKkD0G9VGlql1uuKJXb7XODFKfUscxvDxmgzCBOqtPjuWfpeSjxcWEbabDn2pKPriK2rM13bFOy8HGf3uMIxCBgI9deDAVpAKayiyy4QloVTL4pSeknecBiYRyrROqfZgMLDeEtM6ZMh7mjbwD2JgvddS7nabVh3Q2yM7p/s1448/Action_Dan_Training.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1086&quot; data-original-width=&quot;1448&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgafGqCz6g6jTtYcnjxG7FsACLKkD0G9VGlql1uuKJXb7XODFKfUscxvDxmgzCBOqtPjuWfpeSjxcWEbabDn2pKPriK2rM13bFOy8HGf3uMIxCBgI9deDAVpAKayiyy4QloVTL4pSeknecBiYRyrROqfZgMLDeEtM6ZMh7mjbwD2JgvddS7nabVh3Q2yM7p/w640-h480/Action_Dan_Training.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/7007484319189803874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7007484319189803874' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7007484319189803874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7007484319189803874'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/05/infosec-training-courses-available.html' title='Infosec Training Courses Available - Train Directly With Me'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTWBOyuGtU660qg58A726iCdGuwbd0kp2vaf1jrLV1b6dgBxZxtwd-R-hS9IiDPV6sjXvPO5t4ZnZ7oSZb2Vl5xx21uaXaXWsxdCsj3xz_swTowq3O6G366JfBZ0Ls7_OngG1yvdbzLbjSUmO8RKn2-J1xXMkd9XyyGDaelYfBo2LLLJW918N5NuCTAIoh/s72-w640-h256-c/AD_Training_Banner.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4574439871677282459</id><published>2026-04-30T16:55:00.000-07:00</published><updated>2026-04-30T17:05:25.119-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blue"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="green"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="infosec survival guide"/><category scheme="http://www.blogger.com/atom/ns#" term="introduction"/><category scheme="http://www.blogger.com/atom/ns#" term="orange"/><category scheme="http://www.blogger.com/atom/ns#" term="yellow"/><title type='text'>Book Review: &quot;The Infosec Survival Guides&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIugJsrqj8RSoU-RIayYl5hmvy5AuvhaEglSNmJaT42WV7UYbRynIwPeo0g6qK4IVtLjq62Dy2Cj_kHHqvO3r7brqyCHioAD__J3FKZfQoKTX7foNl8vfjO2LrnV7uvJ7FiuZkgh70iiJTz4AO0ESr2KEKH1gggIpHdqnx4S6DJLXAwWPsRsq_h_QjJOgR/s2185/survival_guides.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;2185&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIugJsrqj8RSoU-RIayYl5hmvy5AuvhaEglSNmJaT42WV7UYbRynIwPeo0g6qK4IVtLjq62Dy2Cj_kHHqvO3r7brqyCHioAD__J3FKZfQoKTX7foNl8vfjO2LrnV7uvJ7FiuZkgh70iiJTz4AO0ESr2KEKH1gggIpHdqnx4S6DJLXAwWPsRsq_h_QjJOgR/w640-h210/survival_guides.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Welcome back y&#39;all. I recently read all four of the current Black Hills Infosec Survival Guides: The &lt;a href=&quot;https://www.blackhillsinfosec.com/3d-flip-book/infosec-survival-guide-green-book/&quot;&gt;Green&lt;/a&gt; (intro), &lt;a href=&quot;https://www.blackhillsinfosec.com/wp-content/uploads/2023/11/Survival_Guide_v2_PDF_LINKEDIN.pdf&quot;&gt;Yellow&lt;/a&gt; (meta), &lt;a href=&quot;https://www.blackhillsinfosec.com/prompt-zine/prompt-issue-infosec-survival-guide-blue-book/&quot;&gt;Blue&lt;/a&gt; (SOC and blue team operations), and &lt;a href=&quot;https://www.blackhillsinfosec.com/3d-flip-book/infosec-survival-guide-orange-book/&quot;&gt;Orange&lt;/a&gt; (incident response) Books. The following is a quick review of all four, to see if they are right for you. Each book shares the same format: sections running 1-3 pages each, community contributor bylines, Loggy the cartoon log mascot in the margins, and a multi-page Antisyphon course catalog at the back. Once you&#39;ve seen the pattern in one, you&#39;ve seen the structural shape of all four. The main differences are in the focus of their contents, which you can see in their individual table of contents below. That said, the articles seem too shallow and unfocused to be practical desk references to me. As I explored all four books, I found them to contain great intro articles, but it didn&#39;t feel like they held a ton of value in revisiting. Each article barely has enough time to introduce the subject, then it has time to make about 2-5 points, which come with some heavy assumptions about how the user is operating. The end result is a bunch of introductory articles with essentially a subject intro and 1-2 nuggets of useful information. This actually lends itself best to the early articles in my opinion because it works best as an intro to Security as a whole, as opposed to technical reference or something you will revisit time and time again.&lt;/p&gt;&lt;p&gt;The first book in the series is the Green book, which I think was really just their first attempt at trying this, which you can kind of see later refined into the Yellow book material. Let&#39;s take a look at the contents of the green book:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Choose Wisely&lt;/li&gt;&lt;li&gt;Common Cyber Threats&lt;/li&gt;&lt;li&gt;How to Set Smart Goals&lt;/li&gt;&lt;li&gt;Use Your Home Lab&lt;/li&gt;&lt;li&gt;OSINT&lt;/li&gt;&lt;li&gt;Understanding GRC&lt;/li&gt;&lt;li&gt;Malware Analysis&lt;/li&gt;&lt;li&gt;Cloud Security&lt;/li&gt;&lt;li&gt;Lead Effective Tabletops&lt;/li&gt;&lt;li&gt;Backdoors &amp;amp; Breaches&lt;/li&gt;&lt;li&gt;Network Engineering&lt;/li&gt;&lt;li&gt;IT Help Desk&lt;/li&gt;&lt;li&gt;Hire The Right Person&lt;/li&gt;&lt;li&gt;Secure Small Business&lt;/li&gt;&lt;li&gt;AI for Good&lt;/li&gt;&lt;li&gt;Umm, Actually...&lt;/li&gt;&lt;li&gt;Who is BHIS?&lt;/li&gt;&lt;li&gt;Antisyphon Course List&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;I think this zine really is a great introduction to information security. Letting people dive into common cyber threats, setting up a home lab, helping them through early career advice is all great stuff. That said I don&#39;t think someone should be running malware only several pages after learning what some fundamental infosec threats and risks are. The Malware Analysis article assumes you already understand what a normal execution environment looks like. If you don&#39;t know that svchost.exe should always have services.exe as a parent, or why explorer.exe spawning cmd.exe is worth flagging, running a sample in a sandbox just produces output you can&#39;t interpret. You&#39;ll see registry modifications and process injections and have no baseline to compare them against. The article teaches you that the discipline exists, not how to practice it This isn&#39;t the worst if you are just getting introduced to the subject, but it can set you up for a bad time if you are actually trying to execute on these things as a novice practitioner. The OSINT article has the same problem in a different domain. Real OSINT is pivot chains, source corroboration, and knowing when you&#39;ve actually exhausted a lead versus when you&#39;ve just hit a wall. Two pages gets you a definition and a tool list. That&#39;s not a methodology, and a tool list without methodology is how people spend three hours in Maltego and conclude the subject doesn&#39;t exist online. I also think this is a bit of a Black Hills marketing play, as opposed to a real handbook. Don&#39;t get me wrong, there is a lot of value in these texts. But the big tell for me is in the page allocation, and we will see this again and again throughout each book. Backdoors &amp;amp; Breaches, a card game BHIS produces and sells, gets as much real estate as any single technical article. Often times it gets almost double the length of a normal article. The Antisyphon course catalog at the back also runs several pages. These aren&#39;t editorially neutral inclusions, they&#39;re product placements in a format that implies field reference. A real field guide doesn&#39;t sell you a companion course.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://spearphish-general-store.myshopify.com/products/the-infosec-survival-guide-yellow&quot;&gt;The Yellow Book&lt;/a&gt; on the other hand seems to acknowledge this a little bit and be another attempt at tightening the scope. I believe this book is kind of a refinement of the Green book as there is a decent amount of overlap between the two. Each part is about 1-3 pages long:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Choose Wisely&lt;/li&gt;&lt;li&gt;5 Phase Plan&lt;/li&gt;&lt;li&gt;Quality Training&lt;/li&gt;&lt;li&gt;Build a Home Lab&lt;/li&gt;&lt;li&gt;To Cert or Not to Cert&lt;/li&gt;&lt;li&gt;How to Get a Job&lt;/li&gt;&lt;li&gt;Social Engineering&lt;/li&gt;&lt;li&gt;Blue Team&lt;/li&gt;&lt;li&gt;Security Operations Center (SOC)&lt;/li&gt;&lt;li&gt;Threat Hunting&lt;/li&gt;&lt;li&gt;Red Team&lt;/li&gt;&lt;li&gt;Pentesting&lt;/li&gt;&lt;li&gt;Backdoors &amp;amp; Breaches&lt;/li&gt;&lt;li&gt;How to Tell a Client No&lt;/li&gt;&lt;li&gt;How to Get a Yes&lt;/li&gt;&lt;li&gt;Purple Team&lt;/li&gt;&lt;li&gt;Incident Response&lt;/li&gt;&lt;li&gt;Digital Forensics&lt;/li&gt;&lt;li&gt;How to Write Reports&lt;/li&gt;&lt;li&gt;Trials and Joys&lt;/li&gt;&lt;li&gt;Mental Health&lt;/li&gt;&lt;li&gt;Protect Your Privacy&lt;/li&gt;&lt;li&gt;How to Put Yourself Out There&lt;/li&gt;&lt;li&gt;Who is BHIS?&lt;/li&gt;&lt;li&gt;Antisyphon Course List&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This book honestly still comes off as a little too Black Hills skewed, and frankly a little unfocused. I was never really sure if the guide was on infosec skills, or the meta of the industry, or jobs within the industry. &quot;How to Get a Job&quot; and &quot;Mental Health&quot; are sitting in the same guide as &quot;Threat Hunting&quot; and &quot;Digital Forensics.&quot; I suppose what connects them isn&#39;t subject matter, it&#39;s audience. People new to the industry who want orientation on everything at once. This also creates its own limitations though, the &#39;Threat Hunting&#39; article can&#39;t go deep when the book&#39;s implicit audience is someone fresh to the industry. I think if it was more logically organized it would come off as cleaner and easier to grok. That said, I do think it&#39;s a strong resource for people who are brand new to the industry. It&#39;s a good way to orient oneself and it&#39;s a decent primer on some different fields in infosec. This again comes off as if it would be helpful for new people, but I&#39;m not sure it&#39;s the desk reference that they were looking to make. By the time you crack open the Blue and Orange books, you&#39;ve seen the pattern. BHIS has a template for each book that isn&#39;t changing. Each article runs 1-3 pages, written by community contributors, doodled over by Loggy the cartoon log mascot, and closed out with a multi-page advertisement for their training catalog and Backdoors &amp;amp; Breaches. These two books are the most technically focused of the series, and that&#39;s both their strength and the clearest lens through which their structural problems become visible. They are still going for the desk reference text, like a replacement for the red team or blue team field manual. I just don&#39;t think it quite nails the reference text. None of the format really feels like cheat sheets, or things I would reference over time. Rather it still feels like intro material. I think I would get the most value out of it the first time I read it or understood the ideas but not much after that.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Let&#39;s look at the the &lt;a href=&quot;https://spearphish-general-store.myshopify.com/products/the-infosec-survival-guide-blue-book-soc-analyst&quot;&gt;Blue Book&lt;/a&gt;&#39;s table of contents:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;One Fight, Many Defenders&lt;/li&gt;&lt;li&gt;The Life of a SOC Analyst&lt;/li&gt;&lt;li&gt;Threat Hunter Methodology&lt;/li&gt;&lt;li&gt;EDR 101&lt;/li&gt;&lt;li&gt;Log Analysis Field Guide&lt;/li&gt;&lt;li&gt;SIEM 101&lt;/li&gt;&lt;li&gt;Network Traffic Analysis&lt;/li&gt;&lt;li&gt;Cloud Basics and Investigation&lt;/li&gt;&lt;li&gt;Backdoors &amp;amp; Breaches&lt;/li&gt;&lt;li&gt;Report As You Go&lt;/li&gt;&lt;li&gt;SOAR 101&lt;/li&gt;&lt;li&gt;AI in SOC&lt;/li&gt;&lt;li&gt;SOC &amp;amp; GRC&lt;/li&gt;&lt;li&gt;Detection Engineering&lt;/li&gt;&lt;li&gt;Application to Advancement&lt;/li&gt;&lt;li&gt;John Strand&#39;s 11 Core Skills&lt;/li&gt;&lt;li&gt;Who is BHIS?&lt;/li&gt;&lt;li&gt;Antisyphon Class List&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The Blue Book is the most focused of the four guides. The focus is clearly SOC work. It includes topics such as monitoring, detection, triage, and the daily grind of the analyst. If you&#39;re new to the field or trying to understand the SOC ecosystem conceptually, this is a genuinely decent orientation. The best articles in this book are the ones where someone sat down and tried to teach a skill rather than describe a role. The Network Traffic Analysis piece by Troy Wojewoda is really solid, sensor placement, flow directionality, east-west traffic as the canary in the coal mine. These are things a working defender actually needs to understand. And John Strand&#39;s 11 Core Skills at the tail end is probably the single most condensed piece of useful framing in the book. His point that we&#39;re training analysts to find needles in haystacks when they don&#39;t know what hay looks like is exactly right, and it&#39;s the kind of insight that belongs at page 2, not page 34. But those articles are surrounded by a lot of ambient noise. There&#39;s a lot of articles that can be read once or skipped all together. The format forces every article to stay at the same altitude, intro-level, regardless of whether the topic demands more. The biggest structural tell in the Blue Book, again is the page count. Backdoors &amp;amp; Breaches gets four pages, tied with zero other articles for most space. Meanwhile, articles on SIEM, SOAR, cloud security, and detection engineering only get two pages. The card game advertisement gets double the real estate as anything technical in the book. That&#39;s not a neutral editorial decision. Further, Backdoors and Breaches is largely a novelty. Don&#39;t get me wrong, it&#39;s cool they made an interactive card game and made it competitive. This is coming from an avid Magic the Gathering player. That said, I have never once used Backdoors and Breaches in a serious work scenario or in place of a real tabletop exercise. The critique is that a guide for SOC analysts is spending a large chunk of its technical page budget on a self produced novelty rather than a concrete Windows Event ID cheat sheet or an example of a SIEM correlation rule. Again this isn&#39;t something RTFM or BTFM would do. Ben Clark&#39;s Blue Team Field Manual gave you 180 pages of commands, one-liners, and reference tables.&lt;/p&gt;&lt;p&gt;Moving on to &lt;a href=&quot;https://spearphish-general-store.myshopify.com/products/the-infosec-survival-guide-orange-book-incident-response&quot;&gt;The Orange Book&lt;/a&gt;&#39;s table of contents:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;IR Manifesto&lt;/li&gt;&lt;li&gt;&quot;Goldilocks&quot; Alert Review&lt;/li&gt;&lt;li&gt;Your Critical First-Hour Response&lt;/li&gt;&lt;li&gt;KAPE 101&lt;/li&gt;&lt;li&gt;A Simple, Useful IR Plan&lt;/li&gt;&lt;li&gt;Incident Investigations&lt;/li&gt;&lt;li&gt;Hayabusa 101&lt;/li&gt;&lt;li&gt;Know Your Enemy&lt;/li&gt;&lt;li&gt;The MITRE ATT&amp;amp;CK® Framework&lt;/li&gt;&lt;li&gt;Common IR Findings&lt;/li&gt;&lt;li&gt;Backdoors &amp;amp; Breaches&lt;/li&gt;&lt;li&gt;Containment &amp;amp; Eradication&lt;/li&gt;&lt;li&gt;DeepBlueCLI 101&lt;/li&gt;&lt;li&gt;Forensic Data&lt;/li&gt;&lt;li&gt;Business Impact Planning&lt;/li&gt;&lt;li&gt;Velociraptor 101&lt;/li&gt;&lt;li&gt;Calling Reinforcements&lt;/li&gt;&lt;li&gt;After the Dust Settles…&lt;/li&gt;&lt;li&gt;Who is BHIS?&lt;/li&gt;&lt;li&gt;Antisyphon Class List&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Orange Book is the best guide in the series. It&#39;s the one that most closely resembles what these publications were trying to be. The focus is tight, incident response from initial triage through post-incident review and several of the articles here are pretty good. The tool &quot;101&quot; articles are where this book earns its keep. KAPE 101, Hayabusa 101, DeepBlueCLI 101, and Velociraptor 101 all follow the same, practical structure. They are solid, usable guides. If you&#39;re a junior responder who has never run Velociraptor, you can read that article, download the binary, and run a VQL query against a process list inside of thirty minutes. That is field utility. That is the spirit of a field manual. I do wish these field guides contained more commands and maybe a few tips and tricks, but these articles are the closest thing to it, imo. One of the most shocking parts is the entire book is on the incident response life cycle but never really includes the incident response life cycle in full. There is an early article that shortcuts the lifecycle to 3 stages rather than 6. But I don&#39;t think you can teach shortcuts without first teaching the full process, otherwise you are shortcutting the lesson rather than the process. The &#39;Containment &amp;amp; Eradication&#39; section delivers one of the most honest pieces of IR guidance in either book: disconnect the internet and rotate all credentials. &quot;Simple doesn&#39;t mean easy.&quot; That framing is correct. Most organizations that get hit with ransomware don&#39;t fail because they didn&#39;t know these were the right moves. they fail because nobody mapped out the blast radius in advance and nobody practiced what credential rotation at scale actually looks like under pressure. The article drives this home effectively. The First-Hour Response article is the longest piece in the book at four pages (notably, the same as Backdoors &amp;amp; Breaches). It earns those pages. The structure, preserve evidence first, then triage, then communicate, is really good, and the escalation tiers (supervisor, security leadership, exec leadership, legal) are genuinely useful scaffolding for someone who has never run a real incident before. Incident Investigations by Patterson Cake is also strong. The MIND framework (Memory, Identity, Network, Disk) is a clean mental model for attack surface categorization, and the Windows/Linux artifact lists are the kind of concrete reference that belongs in a book like this. &quot;Prioritize ASEPs, scheduled tasks, the MFT, and event logs&quot; is something a responder can actually execute on. Compare that to the Blue Book&#39;s &quot;know what&#39;s normal&quot; advice, and the difference in operational altitude is clear. Where the Orange Book stumbles is the same place the Blue Book does, but the failures are more visible because the subject matter demands more depth. The MITRE ATT&amp;amp;CK® Framework gets exactly one page. One page, for a framework that entire training courses are built around. The article correctly identifies ATT&amp;amp;CK as a gap analysis goldmine and gives three full technique examples but then it&#39;s over. This is the exact wrong inversion: Backdoors &amp;amp; Breaches gets four pages; the framework that should inform every detection rule and hunting hypothesis gets one. Common IR Findings is also squeezed into a single page. It&#39;s structured around the Backdoors and Breaches (B&amp;amp;B) cards: Crisis Management, Isolation, UEBA, Endpoint Analysis, none of which I&#39;ve ever seen as top level findings in an incident response report. These are like informational things you would bring up w/ the client, not real IR findings (like systemic malware or active attackers) which is a clever idea in theory, but in practice means the article is half-organized around teaching you about B&amp;amp;B rather than about the findings themselves. The marketing apparatus shapes the editorial even when it doesn&#39;t intend to. Finally they should just toss the IR Manifesto at the beginning of the book. The IR Manifesto that opens the book is two pages of &quot;we are incident responders, we are curious, we serve and protect.&quot; It reads like the kind of thing you read at a conference keynote and then forget on the drive home. It takes up space that could have been a triage checklist. It&#39;s largely useless and no one is even remembering it, let alone ever repeating it.&lt;/p&gt;&lt;p&gt;The Blue and Orange books are the best two in the BHIS Survival Guide series, which is both a compliment and a qualification. The Orange Book in particular has genuine field value, primarily from the tool 101 articles and the Incident Investigations MIND framework. If you&#39;re a junior IR analyst who has never touched KAPE or Velociraptor, this book will save you time. Overall these books are more like intro texts for someone totally new to the topic. The Blue Book is a decent orientation for someone entering the SOC world, but it&#39;s more of a career primer than a field guide. John Strand&#39;s 11 Core Skills is the article everyone should probably read in my opinion. Neither book is what the RTFM/BTFM was. They don&#39;t have the density, the command-line specificity, or the format-as-function that made field manuals like the RTFM genuinely reference-worthy. They&#39;re closer to a well-curated blog anthology, which is essentially what they are, because the model is community contributors writing 2-page articles. That&#39;s not a bad model for building an audience and generating content at scale. But that model has several drawbacks. The most noticeable drawback to me is there is very little cohesiveness between the articles. Some articles approach the defensive posture like a SOC analyst looking at a well instrumented environment, and other articles approach the subject like a researcher or hobbyist working on single log files or samples. Worth buying at the paper price point for someone new to infosec? Sure, these are good and cheap zines to read if you are new to infosec. Is this worth buying as a desk reference or as a seasoned infosec practitioner? Check out the pdf and you can probably skip the hard copy. Think of them as a well-intentioned sampler platter, it&#39;s little nuggets of each idea to expose you to a topic. It&#39;s great for new people, but the value rapidly diminishes the longer you&#39;ve been in the industry.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4574439871677282459/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4574439871677282459' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4574439871677282459'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4574439871677282459'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/04/book-review-infosec-survival-guides.html' title='Book Review: &quot;The Infosec Survival Guides&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIugJsrqj8RSoU-RIayYl5hmvy5AuvhaEglSNmJaT42WV7UYbRynIwPeo0g6qK4IVtLjq62Dy2Cj_kHHqvO3r7brqyCHioAD__J3FKZfQoKTX7foNl8vfjO2LrnV7uvJ7FiuZkgh70iiJTz4AO0ESr2KEKH1gggIpHdqnx4S6DJLXAwWPsRsq_h_QjJOgR/s72-w640-h210-c/survival_guides.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6513923051314766982</id><published>2026-04-19T17:05:00.000-07:00</published><updated>2026-04-19T17:23:27.081-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="discord"/><category scheme="http://www.blogger.com/atom/ns#" term="Gaming malware"/><category scheme="http://www.blogger.com/atom/ns#" term="MaaS"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="PSA"/><category scheme="http://www.blogger.com/atom/ns#" term="slopware"/><category scheme="http://www.blogger.com/atom/ns#" term="threat"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><category scheme="http://www.blogger.com/atom/ns#" term="worm"/><title type='text'>Don&#39;t Run This Game: Inside the Myth Journey Malware Campaign</title><content type='html'>  &lt;div class=&quot;tldr&quot;&gt;
    &lt;div class=&quot;tldr-label&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaMYy-2TP0ubTeO2L9cgPtPzlsS7TmaXWR5U7EZx8jsNHeavvQZnOn5OTw7HVa-_zgcCk7ui7TbPNGh3X2BsM3pSdI08CG2jfJjtJxu2PYolHV5IK9UCPIeQwIozcwDJqqSlxkk302t619ttdA65wCeZLlfdsAc0ZJvDR7IiWCrUNfPKMX8xDL6m3Y69sA/s2814/myth-journey2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1450&quot; data-original-width=&quot;2814&quot; height=&quot;330&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaMYy-2TP0ubTeO2L9cgPtPzlsS7TmaXWR5U7EZx8jsNHeavvQZnOn5OTw7HVa-_zgcCk7ui7TbPNGh3X2BsM3pSdI08CG2jfJjtJxu2PYolHV5IK9UCPIeQwIozcwDJqqSlxkk302t619ttdA65wCeZLlfdsAc0ZJvDR7IiWCrUNfPKMX8xDL6m3Y69sA/w640-h330/myth-journey2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;TL;DR Don&#39;t run random &quot;games&quot; sent over Discord, &lt;b&gt;even from friends&lt;/b&gt;. Even if they&#39;re hosted somewhere that looks legitimate. Google it. Upload it to VirusTotal first. The campaign we are going to look at today steals credentials, crypto wallets, and browser sessions, then spreads through the compromised accounts it just emptied. We are going to look at &lt;b&gt;Myth Journey&lt;/b&gt; or&amp;nbsp;https://myth-journey.com&lt;/p&gt;
    &lt;p&gt;If you already ran it skip to the bottom, to &quot;If You Ran It&quot; immediately.&lt;/p&gt;&lt;/div&gt;

  &lt;!--Intro hook--&gt;
  &lt;div class=&quot;intro-hook&quot;&gt;
    &lt;p&gt;A friend messages you on Discord.&lt;/p&gt;
    &lt;p&gt;They want you to test their game.&lt;/p&gt;
    &lt;p&gt;You run it. &lt;i&gt;Nothing happens.&lt;/i&gt;&lt;/p&gt;
    &lt;p&gt;&lt;b&gt;48 hours later, your accounts are gone.&lt;/b&gt;&lt;/p&gt;
  &lt;/div&gt;
  &lt;p class=&quot;intro-summary&quot;&gt;This is already happening. The Myth Journey campaign is active as of April 2026, and it costs the attacker nearly nothing to operate. I learned about it because my personal friend was compromised and asked me to &quot;test his new game&quot;. Talk about sending your malware to the wrong person.&lt;/p&gt;

  &lt;hr /&gt;

  &lt;!--Section 1--&gt;
  &lt;h2&gt;Why This Attack Is So Cheap to Run&lt;/h2&gt;

  &lt;div class=&quot;callout&quot;&gt;This malware doesn&#39;t need its own infrastructure anymore. It borrows legitimacy.&lt;/div&gt;

  &lt;p&gt;The Myth Journey landing page at &lt;code&gt;myth-journey.com&lt;/code&gt; runs on Vercel&#39;s free tier, the same platform used by thousands of legitimate developers. The payload is hosted on GitHub Releases, with gofile.io as a fallback. The installer is 86 MB, indistinguishable in size from a real game download. Every piece of this sits on infrastructure the attacker didn&#39;t build and doesn&#39;t pay for.&lt;/p&gt;

  &lt;p&gt;The underlying malware, Myth Stealer, is sold as a subscription service on Telegram, payable in crypto and Razer Gold. A buyer doesn&#39;t write code. They pay a fee, get access to a builder, and assemble their own delivery chain. The Myth Journey campaign is one operator&#39;s version. There are others running parallel variants under different names with the same payload kit.&lt;/p&gt;

  &lt;p&gt;The result is a fully functional, professional-looking attack with near-zero overhead. A GitHub link or a Vercel URL is not a trust signal. The HTTPS padlock, the polished page, the fast download speed, none of these mean anything.&lt;/p&gt;

  &lt;hr /&gt;

  &lt;!--Section 2--&gt;
  &lt;h2&gt;Why People Fall For This (And Still Will)&lt;/h2&gt;

  &lt;div class=&quot;callout&quot;&gt;The attack spreads through social engineering on common chat platforms.&lt;/div&gt;

  &lt;p&gt;Everyone wants to play new games with their friends. Especially games their friends wrote. But your friend didn&#39;t send you that. Their hijacked account did.&lt;/p&gt;

  &lt;p&gt;Discord tokens, the session credentials that keep you logged in, are a primary target for this entire malware category. Once stolen, a token gives an attacker full account access without the password, without triggering 2FA. They can read your message history, understand your relationships, and craft targeted messages that fit the conversation. The account looks and sounds like your friend because it has your friend&#39;s entire history to draw from.&lt;/p&gt;

  &lt;p&gt;The lure is a game because it&#39;s plausible. Indie development is common. Beta testing is expected. The ask is small. There&#39;s no obvious red flag in the request itself, which is the point.&lt;/p&gt;

  &lt;p&gt;The download page adds one more nudge. The instructions read: &lt;em&gt;&quot;do not extract the ZIP file and run it in the zip for the best experience.&quot;&lt;/em&gt; That&#39;s not advice, it&#39;s an anti-inspection technique. The instruction discourages the one thing that might reveal what&#39;s inside before you execute it.&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;If anyone on Discord asks you to run a game or an installer, verify through a second channel before you do anything. Call them. Ask what the game is about. A stolen account cannot answer that question in real time.&lt;/strong&gt;&lt;/p&gt;

  &lt;hr /&gt;

  &lt;!--Section 3: Kill Chain--&gt;
  &lt;h2&gt;What Happens After You Click Run&lt;/h2&gt;

  &lt;p&gt;Here is the full execution sequence, based on direct binary analysis and sandbox observation of our exact sample.&lt;/p&gt;

  &lt;!--Stage 1--&gt;
  &lt;h3&gt;Stage 1: The Installer&lt;/h3&gt;

  &lt;p&gt;&lt;code&gt;&quot;MythicJourney Setup 1.1.2.exe&quot;&lt;/code&gt;&amp;nbsp;is an 86MB NSIS self-extracting installer, the same format used by Notepad++ and VLC. It shows a progress bar. It looks like every other installer you&#39;ve ever run.&lt;/p&gt;

  &lt;p&gt;&lt;span class=&quot;hash&quot;&gt;SHA-256: &lt;a href=&quot;https://www.virustotal.com/gui/file/1567e11339c9dd227691111007a2021a90195f28a1d4b7766c1baee961953324/detection&quot;&gt;1567e11339c9dd227691111007a2021a90195f28a1d4b7766c1baee961953324&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

  &lt;p&gt;The PE header checksum is zeroed. The compile timestamp reads 2018, a seven-year-old NSIS stub, reused because the timestamp mismatch confuses automated triage. The 86 MB of malicious content doesn&#39;t live in the standard PE sections at all, it&#39;s compressed in the overlay, invisible to plain string scanning. This malware hides its real payload so well that basic antivirus tools don&#39;t even see it. AV detection at time of analysis was effectively zero.&lt;/p&gt;

  &lt;p&gt;Inside the compressed overlay:&lt;/p&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;code&gt;app-64.7z -&lt;/code&gt;&amp;nbsp;an 85 MB archive containing a complete Electron application (the actual stealer)&lt;/li&gt;
    &lt;li&gt;Five other NSIS plugin DLLs for extraction and execution&lt;/li&gt;
    &lt;li&gt;A fake uninstaller for cover&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p&gt;The install sequence: &lt;br /&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;NSIS decompresses everything to &quot;&lt;code&gt;%TEMP%\nsd557A.tmp\&quot;&lt;/code&gt;&lt;/li&gt;&lt;li&gt;Installs the Electron payload to &quot;&lt;code&gt;%LOCALAPPDATA%\Programs\MythicJourney\MythicJourney.exe&quot;&lt;/code&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Drops a persistence copy to &quot;&lt;code&gt;%LOCALAPPDATA%\mythicjourney-updater\installer.exe&quot;&lt;/code&gt;&lt;/li&gt;&lt;li&gt;Then deletes the temp directory.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;

  &lt;div class=&quot;why-matters&quot;&gt;
    &lt;div class=&quot;why-matters-label&quot;&gt;By the time installation finishes, there&#39;s no trace of how it got there, and the malware is running under a name that looks like a normal app.&lt;/div&gt;&lt;/div&gt;

  &lt;!--Stage 3--&gt;
  &lt;h3&gt;Stage 2: The Electron Payload&lt;/h3&gt;

  &lt;p&gt;&lt;code&gt;MythicJourney.exe&lt;/code&gt; is a full Electron application, the same framework used by VS Code, Slack, and Discord itself. Packaging a stealer as an Electron app is deliberate. It looks like legitimate software, behaves like legitimate software, is interpreted at runtime, and its network traffic looks like legitimate software.&lt;/p&gt;

  &lt;p&gt;The bundled native addons tell you exactly what it&#39;s after:&lt;/p&gt;

  &lt;table&gt;
    &lt;thead&gt;
      &lt;tr&gt;&lt;th&gt;Module&lt;/th&gt;&lt;th&gt;What it does&lt;/th&gt;&lt;/tr&gt;
    &lt;/thead&gt;
    &lt;tbody&gt;
      &lt;tr&gt;&lt;td&gt;&lt;code&gt;@primno/dpapi&lt;/code&gt;&lt;/td&gt;&lt;td&gt;Calls Windows &quot;&lt;code&gt;CryptUnprotectData&quot;&lt;/code&gt;&amp;nbsp;to decrypts browser master keys&lt;/td&gt;&lt;/tr&gt;
      &lt;tr&gt;&lt;td&gt;&lt;code&gt;better-sqlite3&lt;/code&gt;&lt;/td&gt;&lt;td&gt;Reads browser SQLite databases directly (&lt;code&gt;Login Data&lt;/code&gt;, &lt;code&gt;Cookies&lt;/code&gt;, &lt;code&gt;Web Data&lt;/code&gt;)&lt;/td&gt;&lt;/tr&gt;
      &lt;tr&gt;&lt;td&gt;&lt;code&gt;robotjs&lt;/code&gt;&lt;/td&gt;&lt;td&gt;Screen capture, keyboard input&lt;/td&gt;&lt;/tr&gt;
      &lt;tr&gt;&lt;td&gt;&lt;code&gt;archiver&lt;/code&gt;&lt;/td&gt;&lt;td&gt;ZIP packages stolen data for exfiltration&lt;/td&gt;&lt;/tr&gt;
      &lt;tr&gt;&lt;td&gt;&lt;code&gt;aes-js&lt;/code&gt;&lt;/td&gt;&lt;td&gt;Encrypts staged data locally&lt;/td&gt;&lt;/tr&gt;
    &lt;/tbody&gt;
  &lt;/table&gt;

  &lt;!--Stage 4--&gt;
  &lt;h3&gt;Stage 3: Three Layers of Obfuscation&lt;/h3&gt;

  &lt;p&gt;The stealer logic lives in a single 2.9 MB JavaScript file (&lt;code&gt;main.js&lt;/code&gt;) inside the Electron application archive. It is layered three levels deep.&lt;/p&gt;

  &lt;p&gt;The outer layer uses a custom base91 encoding scheme: 321 string table entries, shuffled by a rotation function, the entire script wrapped in an obfuscated&amp;nbsp;&lt;code&gt;Function()&lt;/code&gt; constructor so nothing executes or resolves until runtime. No plaintext URLs. No IPs. Nothing for a scanner to catch.&lt;/p&gt;

  &lt;p&gt;Decoding that reveals an AES-256-GCM encrypted second payload embedded directly in the file:&lt;/p&gt;

  &lt;pre&gt;&lt;code&gt;Key:   26303b532115653c49f950999fa94f1af5abb94a8f39b113e102025adbc6ba4b
Nonce: 74fa957219626ffb885f5aec&lt;/code&gt;&lt;/pre&gt;

  &lt;p&gt;Decrypting yields 1.1 MB of a second obfuscated JavaScript payload, itself with 679 encoded string table entries and state-machine control flow. The only thing that leaked in plaintext was the module list passed to &lt;code&gt;require()&lt;/code&gt; — &lt;code&gt;&quot;axios&quot;&lt;/code&gt; (HTTP client for C2), &lt;code&gt;&quot;crypto&quot;&lt;/code&gt;, and &lt;code&gt;&quot;bytenode&quot;&lt;/code&gt; (bytecode loader, likely a third stage we haven&#39;t reached). The C2 address is still locked inside those 679 encrypted strings.&lt;/p&gt;

  &lt;pre&gt;&lt;code&gt;NSIS installer (86 MB)
  └─ app-64.7z (Electron runtime)
       └─ app.asar → main.js (basE91 obfuscated)
            └─ AES-256-GCM decrypt → stage2.js
                 └─ [bytenode .jsc] → possible Stage 3&lt;/code&gt;&lt;/pre&gt;

  &lt;div class=&quot;translation&quot;&gt;
    &lt;div class=&quot;translation-label&quot;&gt;&lt;br /&gt;&lt;/div&gt;
    The malware is a set of nested encrypted containers. You have to crack each layer before you can even see the next one. I got through two layers. There may be more beyond the third I haven&#39;t decoded.
  &lt;/div&gt;

  &lt;!--Stage 5--&gt;
  &lt;h3&gt;Stage 4: Reconnaissance and Evasion&lt;/h3&gt;

  &lt;p&gt;I also uploaded a sample to &lt;a href=&quot;https://www.virustotal.com/gui/file/1567e11339c9dd227691111007a2021a90195f28a1d4b7766c1baee961953324/behavior&quot;&gt;VirusTotal&lt;/a&gt; for their sandboxes and &lt;a href=&quot;https://hybrid-analysis.com/sample/1567e11339c9dd227691111007a2021a90195f28a1d4b7766c1baee961953324/69e4f9da89f8cfdb490c8848&quot;&gt;HybridAnalysis&lt;/a&gt;. HybridAnalysis was good at teasing out the various layers of anti-reversing at play. Before touching credentials, the payload verifies the environment. It spawns 17+ PowerShell instances and queries system hardware, disk drives, BIOS, motherboard, RAM, GPU, monitors, then runs explicit evasion checks:&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;code&gt;&quot;(Get-CimInstance Win32_ComputerSystem).HypervisorPresent&quot;&lt;/code&gt; — are we in a VM?&lt;/li&gt;
    &lt;li&gt;&lt;code&gt;&quot;[System.Windows.Forms.SystemInformation]::TerminalServerSession&quot;&lt;/code&gt; — are we in an RDP/sandbox session?&lt;/li&gt;
    &lt;li&gt;&lt;code&gt;&quot;echo %COMPUTERNAME%.%USERDNSDOMAIN%&quot;&lt;/code&gt; — are we on a corporate domain-joined machine?&lt;/li&gt;
    &lt;li&gt;&lt;code&gt;&quot;WHERE smartctl&quot;&lt;/code&gt; — are disk forensics tools installed?&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p&gt;It immediately kills &lt;code&gt;watcher.exe&lt;/code&gt; and &lt;code&gt;mitmdump.exe,&lt;/code&gt;&amp;nbsp;common dynamic analysis and MITM proxy tools, by name. If something is watching it, it kills the watcher.&lt;/p&gt;

  &lt;p&gt;&lt;b&gt;The sandbox we submitted this to scored it 100/100 malicious.&amp;nbsp;&lt;/b&gt; &lt;i&gt;But&amp;nbsp;AV marked it clean at runtime!&lt;/i&gt; That gap is the entire point of this evasion layer.&lt;/p&gt;

  &lt;!--Stage 6--&gt;
  &lt;h3&gt;Stage 5: Credential Theft and Exfiltration&lt;/h3&gt;

  &lt;p&gt;With the environment cleared, the payload:&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;Opens a handle to &quot;&lt;code&gt;lsass.exe&quot;,&lt;/code&gt;&amp;nbsp;the Windows process holding cached authentication credentials in memory (NTLM hashes, Kerberos tickets)&lt;/li&gt;
    &lt;li&gt;Injects 4,024 bytes into 18 PowerShell processes, with &lt;code&gt;PAGE_GUARD&lt;/code&gt; memory protection on the injected code to block memory dumping&lt;/li&gt;
    &lt;li&gt;Reads &quot;&lt;code&gt;desktop.ini&quot;&lt;/code&gt; from every user shell folder (Desktop, Documents, Downloads, Music, Pictures, Videos, OneDrive), mapping the filesystem for data staging&lt;/li&gt;
    &lt;li&gt;Attempts to access &quot;&lt;code&gt;%APPDATA%\EXODUS\EXODUS.WALLET\SEED.SECO&quot;,&lt;/code&gt;&amp;nbsp;the Exodus wallet master seed phrase&lt;/li&gt;
    &lt;li&gt;Decrypts browser credential stores via DPAPI and reads browser SQLite databases directly&lt;/li&gt;
    &lt;li&gt;Packages everything into an encrypted archive for exfiltration&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p&gt;It&#39;s suspected that the C2 communication goes out over TLS:443 to CDN-fronted endpoints (&lt;code&gt;104.16.124.96&lt;/code&gt; on Cloudflare and&amp;nbsp;&lt;code&gt;142.251.210.35&lt;/code&gt; on Google&#39;s network). These are not the attacker&#39;s servers, they&#39;re CDN edge nodes. This enables the C2 to automatically rotate IPs without touching the malware binary and the network traffic is indistinguishable from normal HTTPS to Google.&lt;/p&gt;

  &lt;p&gt;The runtime also installs a certificate into the Windows certificate store, allowing its own TLS to be trusted without triggering OS warnings.&lt;/p&gt;&lt;div class=&quot;why-matters&quot;&gt;
    By the time this finishes, your browser passwords, session cookies, Discord token, and wallet seed are on a remote server. Your Discord account is now delivering the same message to your contacts.
  &lt;br /&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;hr /&gt;

  &lt;!--If You Ran It--&gt;
    &lt;h2 id=&quot;ran-it&quot;&gt;If You Ran It&lt;/h2&gt;
    &lt;p style=&quot;color: #d08080; margin-bottom: 1rem;&quot;&gt;Assume full compromise. Don&#39;t spend time figuring out what was taken, move immediately.&lt;/p&gt;
    &lt;ol&gt;
      &lt;li&gt;Change every password from a clean device.&lt;/li&gt;
      &lt;li&gt;Revoke all active sessions: Discord, Google, GitHub, any financial service.&lt;/li&gt;
      &lt;li&gt;Enable hardware 2FA: TOTP app or phone verification minimum&lt;/li&gt;
      &lt;li&gt;Regenerate cryptocurrency wallets from a clean seed on a clean machine, then move funds before anything else.&lt;/li&gt;
      &lt;li&gt;Delete &quot;&lt;code&gt;%LOCALAPPDATA%\Programs\MythicJourney\&quot;&lt;/code&gt; and &quot;&lt;code&gt;%LOCALAPPDATA%\mythicjourney-updater\&quot;&lt;/code&gt;&lt;/li&gt;
      &lt;li&gt;Check &quot;&lt;code&gt;%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup&quot;&lt;/code&gt; for unexpected shortcuts&lt;/li&gt;
      &lt;li&gt;Report &quot;&lt;code&gt;github.com/ryprs&quot;&lt;/code&gt; and &quot;&lt;code&gt;myth-journey.com&quot;&lt;/code&gt; to GitHub and Vercel abuse teams&lt;/li&gt;
    &lt;/ol&gt;
    &lt;p style=&quot;margin-top: 1.25rem;&quot;&gt;The attacker who built this campaign is almost certainly a MaaS customer, not the malware author. The author sells the kit; operators build their own delivery chains. The same payload runs under different names in parallel campaigns. If a friend on Discord asked you to test a game and something feels off, their account may already be hacked.&lt;br /&gt;&lt;/p&gt;

  &lt;footer&gt;
    Analysis date: April 2026 &amp;nbsp;·&amp;nbsp; Classification: Infostealer / MaaS / Social Engineering &amp;nbsp;·&amp;nbsp; Threat level: Med&lt;/footer&gt;




</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/6513923051314766982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6513923051314766982' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6513923051314766982'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6513923051314766982'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/04/dont-run-this-game-inside-myth-journey.html' title='Don&#39;t Run This Game: Inside the Myth Journey Malware Campaign'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaMYy-2TP0ubTeO2L9cgPtPzlsS7TmaXWR5U7EZx8jsNHeavvQZnOn5OTw7HVa-_zgcCk7ui7TbPNGh3X2BsM3pSdI08CG2jfJjtJxu2PYolHV5IK9UCPIeQwIozcwDJqqSlxkk302t619ttdA65wCeZLlfdsAc0ZJvDR7IiWCrUNfPKMX8xDL6m3Y69sA/s72-w640-h330-c/myth-journey2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8621396705130357451</id><published>2026-04-04T09:03:00.000-07:00</published><updated>2026-04-04T09:03:00.110-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Agentic"/><category scheme="http://www.blogger.com/atom/ns#" term="agents"/><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="Artificial Intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="Models"/><category scheme="http://www.blogger.com/atom/ns#" term="Swarm"/><title type='text'>Book Review: &quot;Agentic Artificial Intelligence&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/s1000/Agentic_AI.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;665&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/w266-h400/Agentic_AI.jpg&quot; width=&quot;266&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&quot;Agentic Artificial Intelligence: Harnessing AI Agents to Reinvent Business, Work, and Life&quot; by Pascal Bornet. This book was written at the very beginning of the agentic AI wave, looking at early adopters of using LLMs in agents to have generic language models drive computer tools. It has some great lessons learned on implementing agentic systems, but it’s largely non-technical, likely because it was written before these systems became standardized.. I listened to this &lt;a href=&quot;https://www.amazon.com/Agentic-Artificial-Intelligence-Harnessing-Reinvent/dp/B0F1KFKNBB&quot;&gt;on Audible&lt;/a&gt; at about ~$15 for roughly 10 hours (on 1.5x speed).&amp;nbsp; At nearly 500 pages it&#39;s a pretty heavy read, although I personally found the first two parts the most impactful in terms of AI theory and implementation insights. The final three parts shift toward business building, enterprise adoption, and long-term societal impact. While the end of the book seemed to depart from reality a bit (talking about Universal Basic Income once agents take over the majority of jobs), I thought the beginning was fascinating and eye opening in terms of planning and reasoning with agents. Overall I&#39;m going to give this 5 out of 10 stars. I recommend this to people wanting to get more theory and guidance when building out agentic systems, although I&#39;m not sure I would recommend this if you were looking for a technical book. The book has no real mention of actual technology needed to implement these ideas. There is almost no mention of specific models, structures, or even the types of agents that could be run to automate these goals. In that sense the book left a lot to be desired, it was almost purely theory.&amp;nbsp; That said, I did enjoy the first two parts of the book. The following are the chapters of the book so you can get a better idea of it&#39;s contents before picking it up:&lt;/p&gt;&lt;p&gt;Introduction&lt;br /&gt;&lt;b&gt;Part 1: The Rise of AI Agents&lt;/b&gt;&lt;br /&gt;Chapter 1: Beyond ChatGPT: The Next Evolution of AI&lt;br /&gt;Chapter 2: The Five Levels of AI Agents: From Automation to Autonomy&lt;br /&gt;Chapter 3: Inside the Mind of an AI Agent&lt;br /&gt;Chapter 4: Putting AI Agents to the Test&lt;br /&gt;&lt;b&gt;Part 2: The Three Keystones of Agentic AI&lt;/b&gt;&lt;br /&gt;Chapter 5: Action: Teaching AI to Do, Not Just Think&lt;br /&gt;Chapter 6: Reasoning: From Fast to Wise&lt;br /&gt;Chapter 7: Memory: Building AI That Learns&lt;br /&gt;&lt;b&gt;Part 3: Entrepreneurship and Professional Growth with AI Agents&lt;/b&gt;&lt;br /&gt;Chapter 8: A Practical Guide For Building Successful AI Agents&lt;br /&gt;Chapter 9: From Ideas to Income: Business Models for the Agent Economy&lt;br /&gt;&lt;b&gt;Part 4: Enterprise Transformation Through Agentic AI&lt;br /&gt;&lt;/b&gt;Chapter 10: Human-Agent Collaboration: Leadership, Trust, and Change&lt;br /&gt;Chapter 11: Scaling AI Agents From Vision to Reality&lt;br /&gt;Chapter 12: Case Study and Use Cases of Agents Across Industries&lt;br /&gt;&lt;b&gt;Part 5: Future Horizons For Work and Society&lt;br /&gt;&lt;/b&gt;Chapter 13: The New World of Work&lt;br /&gt;Chapter 14: Society in the Age of Agents&lt;br /&gt;Conclusion&lt;/p&gt;&lt;p&gt;I struggled with parts of the book, because it repeatedly argues that agents should take action, but rarely explains &lt;i&gt;how&lt;/i&gt; that action is implemented.. Should agents be calling APIs in a microservice architecture, or should we be giving agents full control of systems with local tools like ClawdBot? Is it better to give agents skills on how to use specific tools, or should we continue using MCP servers for up-to-date information on the tools? There is a ton of implementation details the book conveniently glosses over. The book also glosses over memory in a similar way, which in my experience if done wrong can make an agentic system much worse. Memory has lots of core questions, like storage location and structure, as well as retrieval quality and embedding limitations. It&#39;s a pretty hard thing to get right, so I&#39;m surprised it didn&#39;t dive into any of the technical edge cases there. One technique the book does mention in depth is using an extensive RAG library or even a wiki or onboarding documents to support the agentic system if it needs to lookup context or understanding around a process. The book is also very idealistic. From it&#39;s estimations on agentic reasoning capabilities (nearly a year after it was written and these models still make regular mistakes) to it&#39;s predictions around Universal Basic Income when many common jobs are automated, it honestly makes me a little worried what a more grounded future might look like when I see these as proposed solutions.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/HXy3J1mGHRE?si=j307aro6QxFc0i9R&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/8621396705130357451/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8621396705130357451' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8621396705130357451'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8621396705130357451'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/04/book-review-agentic-artificial.html' title='Book Review: &quot;Agentic Artificial Intelligence&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5iL3tuJkFMMGxL0vnkiwL-kqYeAyThnm_9ReiA_1JsPoKxpvRgbe1-8Kd3M3Ko6Kr-h1oDd4SEw4SFEBHdIqAVerAtx4qCsl-z8Fxdt8j_TbYecnu-GwuuP003hx4045RONaspQZGP9RaJXujBVQU_qTQ_uWQNy9i8xkkWUsLMqDlQ9DJWLF9y0CUmm4/s72-w266-h400-c/Agentic_AI.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-1242194826733710165</id><published>2026-04-01T09:25:00.000-07:00</published><updated>2026-04-01T09:25:24.382-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI writting"/><category scheme="http://www.blogger.com/atom/ns#" term="blogging"/><category scheme="http://www.blogger.com/atom/ns#" term="LLM content"/><category scheme="http://www.blogger.com/atom/ns#" term="technical writting"/><title type='text'>On The Rise of AI Augmented Writing</title><content type='html'>&lt;p&gt;Welcome back Internet people! Lately I&#39;ve seen a rise in AI generated articles, blog posts, and even book content. I need to say loudly, as a reader,&amp;nbsp;&lt;b&gt;this is a major turnoff&lt;/b&gt;. If a reader can tell that something was written by AI, then the tools are being used poorly.&amp;nbsp;&lt;b&gt;Please don’t pass off LLM output directly as human writing&lt;/b&gt;. It makes your work output feel cheap. AI should be used as a writing tool, it shouldn&#39;t be replacing human writers altogether.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When writers use LLM output verbatim the result is often stale and lacks clarity. In many cases, it actually makes ideas harder to understand. Current LLMs struggle to maintain consistent, logical models of complex ideas. So while the writing may sound polished at first, it sometimes misrepresents concepts or drifts into conflicting, multiple definitions. Moving past the coherency issues, it&#39;s often obvious when a writer has an overreliance on verbatim LLM output. There are many obvious &lt;i&gt;tells&lt;/i&gt;. From the overuse of the em dash, to the nonsensical use of the colon; AI generated content sticks out to those who use frontier models often. Certain phrasing patterns also stand out. For example: “It’s not X, it’s Y.” As a writer, this often feels like filler. Just write about Y. Just because these are the current form of these &lt;i&gt;tells&lt;/i&gt; doesn&#39;t mean these are universal or ubiquitous &lt;i&gt;tells&lt;/i&gt;. Quite the opposite, these will change over time as the models change, but the heavy users of the models will very likely recognize their output when used verbatim.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Don&#39;t get me wrong, &lt;i&gt;I&#39;m not saying don&#39;t use LLMs to help you write&lt;/i&gt;. I previously wrote about &lt;a href=&quot;https://lockboxx.blogspot.com/2024/11/ai-augmented-technical-writing.html&quot;&gt;how to use AI in your technical writing&lt;/a&gt;, such as creating templates, voice files, and dynamic prompts to generate rich content. It also makes for a great editor! But one of the key takeaways there is in the last paragraph, where I emphasize heavily modifying and adapting the output. You can&#39;t use the output verbatim; frontier LLM output is just too recognizable.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I recently read this great and thoughtful article titled &quot;&lt;a href=&quot;https://alexhwoods.com/dont-let-ai-write-for-you/&quot;&gt;Don&#39;t Let AI Write For You&lt;/a&gt;&quot;, where Alex Woods lays out that the point of writing is to develop and cement thoughts worth communicating, not simply generating words or content. I couldn&#39;t agree with this more. I often use LLMs to help expand on ideas, or think about edge cases I might be considering. I use it to help me refine my writing prompts and generate starting points. But very rarely do I use the ideas or output verbatim. It&#39;s an incredibly useful tool, but in my opinion it shouldn&#39;t replace the art all together.&amp;nbsp;&lt;/p&gt;&lt;p&gt;So I&#39;ll repeat it, and I hope somewhere out there other writers take it to heart. When writers use LLM output verbatim it comes across as incredibly lazy. And frankly, why would anyone read that? A reader could just prompt the model themselves and get the same result.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/s912/stars.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;280&quot; data-original-width=&quot;912&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/w640-h196/stars.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/1242194826733710165/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/1242194826733710165' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1242194826733710165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/1242194826733710165'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/04/on-rise-of-ai-augmented-writing.html' title='On The Rise of AI Augmented Writing'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ4ShcnsHBe_X8eO8UeC8glnb1Y8-bFZOW6SW2VReN8nDq_vym-7SEynlBCqvmdnsfPDhgwmhsje_2E02k5ifpSJGfRe1I0b7BwLPo6UdJDtA5zkWdTYtgP7as-Blkk9ORgonSr2hgZ3fYn_iQxDuaOJUcypckT_edR5UENvcBn5bEAOgOTig97LTWxEK/s72-w640-h196-c/stars.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-9174668462974331521</id><published>2026-03-18T04:07:00.000-07:00</published><updated>2026-03-18T04:25:08.619-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adversarial AI"/><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="GAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Book Review: &quot;Adverserial AI Attacks, Mitigations, and Defense Strategies&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/s1000/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;811&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/w325-h400/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg&quot; width=&quot;325&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
I recently finished &quot;Adversarial AI Attacks, Mitigations, and Defense Strategies: A Cybersecurity professional&#39;s guide to AI attacks, threat modeling, and securing AI with ML/SecOps&quot; the book by John Sotiropoulos.&amp;nbsp;The book is a deep dive into adversarial machine learning, focusing heavily on how AI models can be attacked across their lifecycle, from training and supply chain to deployment and inference, using techniques like poisoning, perturbations, and model extraction. The book is a great deep dive on model-level security and the various mode-level adversarial attacks. I grabbed the book &lt;a href=&quot;https://www.amazon.com/Adversarial-Attacks-Mitigations-Defense-Strategies-ebook/dp/B0D6RB24H8/&quot;&gt;for about ~$30&lt;/a&gt;, mostly because they were a fellow Packt author, and read it over the course of a long weekend.&amp;nbsp; Overall, I&#39;m give this book 6 out of 10 stars. At over 600 pages, it’s a dense read, and even though it’s divided into a handful of major parts, the structure doesn’t always make it easier to navigate. I&#39;m sure this type of content is useful to some kind of academic or maybe a company actually making and hardening the models themselves, but I&#39;m not sure general security practitioners could apply most of this book. It strikes me as the difference between cryptography security (attacking the algorithms) and applied cryptography security (attacking systems using crypto). The former would have an extremely small audience and applicability, whereas the later is very useful to most security engineers. This book is the former, but for AI. The quality isn’t the issue, it’s more that the content doesn’t map well to the needs of most security practitioners.The book is clearly focused on a model-centric view of AI security, and that shapes both its strengths and weaknesses. A large portion of the content is focused on algorithmic attacks against machine learning models themselves, using techniques such as poisoning, evasion, extraction, inversion, etc. The book goes into meaningful depth on how these techniques work, which is neat, but these feel very much like academic attacks to me as a practitioner.&amp;nbsp;That makes it a strong resource for understanding how models can fail at a mathematical or behavioral level, and introduced me to a lot of resources to that extent, such as the &lt;a href=&quot;https://github.com/Trusted-AI/adversarial-robustness-toolbox&quot;&gt;Adversarial Robustness Toolbox&lt;/a&gt;.&amp;nbsp;This gives the material a practical edge and makes it easier to reproduce attacks in a controlled environment, allowing you to see the techniques for yourself.&amp;nbsp; In my typical style, here are the chapters of the book, so you can get a better understanding of the content:&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;Chapter 1: Getting Started with AI&lt;/div&gt;&lt;div&gt;Chapter 2: Building Our Adversarial Playground&lt;/div&gt;&lt;div&gt;Chapter 3: Security and Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 4: Poisoning Attacks&lt;/div&gt;&lt;div&gt;Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming&lt;/div&gt;&lt;div&gt;Chapter 6: Supply Chain Attacks and Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 7: Evasion Attacks against Deployed AI&lt;/div&gt;&lt;div&gt;Chapter 8: Privacy Attacks: Stealing Models&lt;/div&gt;&lt;div&gt;Chapter 9: Privacy Attacks: Stealing Data&lt;/div&gt;&lt;div&gt;Chapter 10: Privacy-Preserving AI&lt;/div&gt;&lt;div&gt;Chapter 11: Generative AI: A New Frontier&lt;/div&gt;&lt;div&gt;Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks&lt;/div&gt;&lt;div&gt;Chapter 13: LLM Foundations for Adversarial AI&lt;/div&gt;&lt;div&gt;Chapter 14: Adversarial Attacks with Prompts&lt;/div&gt;&lt;div&gt;Chapter 15: Poisoning Attacks and LLMs&lt;/div&gt;&lt;div&gt;Chapter 16: Advanced Generative AI Scenarios&lt;/div&gt;&lt;div&gt;Chapter 17: Secure by Design and Trustworthy AI&lt;/div&gt;&lt;div&gt;Chapter 18: AI Security with MLSecOps&lt;/div&gt;&lt;div&gt;Chapter 19: Maturing AI Security&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Where the book does particularly well is in drawing a clear distinction between recognition-based AI systems and generative AI systems, and explaining how different their attack surfaces really are. The treatment of traditional models, image classifiers, NLP predictors, and similar systems, focuses on adversarial examples and perturbation-based attacks that manipulate outputs without changing the underlying model. In contrast, the discussion of generative AI shifts toward prompt injection, jailbreaking, indirect attacks through retrieved content, and abuse of tool integrations. This distinction is important, because it highlights how generative AI expands the attack surface to language driven control of systems, which is particularly relevant today with the rise of agents. There is also a really good history of the evolution of these systems throughout the book, which is helpful historical context to get. Another thing the book does pretty well is give the reader a hands-on introduction to generative models, particularly GANs, before moving into how they can be abused. It doesn’t just stay conceptual, it walks through building a GAN from scratch, explaining the generator–discriminator dynamic and how they’re trained against each other. The book walks you through building your own naive GANs for things such as deep fakes, which is certainly fun although I&#39;m not sure how truly useful. Further the defensive content is generally less detailed and less operational than the attack content. There is comparatively little guidance on how to implement security controls in real GAN pipelines, how to monitor for abuse, or how to use AI to improve existing cloud and application security practices. To me, the audience is clearly people doing research in adversarial machine learning or teams that are actually building and hardening their own models from the ground up. For that group, the depth on model-level attacks is probably useful. But for a general security practitioner, especially someone working on real-world systems that integrate AI rather than build it, much of the content feels difficult to apply. The scenarios are often centered on directly attacking or manipulating models in ways that just aren’t relevant if your organization is primarily consuming third-party models through APIs like ChatGPT or Claude.&amp;nbsp;That model-centric perspective is also reflected in the book’s implicit assumption that organizations own and train their models. Much of the threat model revolves around scenarios like model theft, training data poisoning, and tampering with serialized model artifacts. While these are valid concerns, they are less aligned with how many enterprises actually use AI today. Most organizations are consumers of models rather than builders, relying on APIs from foundational models. In those environments, the attack surface shifts away from model internals and toward things like API misuse, prompt injection, data leakage through retrieval, and access control failures. As a result, some of the book’s most detailed attack scenarios can feel somewhat removed from the day-to-day risks faced by most security teams out there. We can hear John talk below about the OWASP top 10 AI risks :&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/-vXoC0UvpjY?si=4TCKgQHxsQdbYow2&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/9174668462974331521/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/9174668462974331521' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/9174668462974331521'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/9174668462974331521'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/03/book-review-adverserial-ai-attacks.html' title='Book Review: &quot;Adverserial AI Attacks, Mitigations, and Defense Strategies&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75Fj9FcJgv98DLfnRGm_5AEEuL6SK8tZ8EArDuDvFi-2WWwgSDaXUTDsIr1exahHxx8oVJSmHWF-L10xLQv93ApU45k6H-wrxfww49usVXrRnjAiEKcUUGqKGz-kgEff_Apc-WOzUptXntwQgCVOk90Dan9zbHP_qimOXHscBVwJShzn1c9PggplbMQoE/s72-w325-h400-c/Adverserial%20AI%20Attacks%20-%20Book%20Cover.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6825164890668381113</id><published>2026-03-05T07:49:00.000-08:00</published><updated>2026-03-05T07:49:28.450-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI Research"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Defensive Refusal Bias"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><title type='text'>Defensive Refusal Bias in LLMs is Hurting Infosec</title><content type='html'>&lt;p&gt;Last year a few of us in infosec &lt;a href=&quot;https://lockboxx.blogspot.com/2025/04/red-teaming-at-nccdc-2025.html&quot;&gt;met up for the National CCDC competition&lt;/a&gt; and did some LLM research while at the competition. We gathered data from both the defenders and the attackers on their ussage of LLMs and how well the technology aided them in the competition. This research goes on to show that these LLMs really aren&#39;t helping the blue teams, especially when paired with the evolutionary direction i&#39;ve seen ALCCDC go. We can see a clear bias towards tools like Claude Code enabling offensive tool development and helping attackers, to the extent that the agent swarm will activly hack for the attacker, whereas the blue teams are struggling to get simple questions answered from LLMs like ChatGPT for the fear that the information may be abused.&amp;nbsp;&lt;/p&gt;&lt;p&gt;What we found became the basis of our &lt;a href=&quot;https://arxiv.org/abs/2603.01246&quot;&gt;research on Defensive Refusal Bias&lt;/a&gt;, but the story has only gotten more interesting since then. During the competition we collected thousands of real prompts from both blue and red interacting with LLMs. The results showed something counterintuitive: modern safety-aligned models were far more likely to refuse legitimate defensive questions than they were to block creative offensive questions. Blue teams trying to analyze malware, harden systems, or investigate suspicious processes were frequently blocked because their requests looked “too much like hacking.” Meanwhile, attackers could often get what they needed simply by framing their prompts as experimentation, scripting help, or development work.&lt;/p&gt;&lt;p&gt;Fast forward to spring 2026, and the gap appears to be widening. After just completing events like &lt;a href=&quot;https://lockboxx.blogspot.com/2026/03/alccdc-2026-review.html&quot;&gt;ALCCDC last weekend&lt;/a&gt;, tools like Claude Code are rapidly evolving into autonomous agent swarms, capable of developing deep offensive capabilities, writing exploit scripts, chaining reconnaissance tools, and iterating quickly on offensive tooling. Not only that, with some clever prompting and abstraction, Claude Code will drive an offensive agent swarm as an operator, doing fully automated hacking and post-exploitation of victim systems. In practice, what this means is that attackers can now spin up something closer to an offensive agent collective, a set of automated assistants that will explore systems, write exploits, refine attacks collaboratively, and move to post exploitation activities. They will also leverage their own post exploitation for creative attack chains moving forward. Instead of just answering questions, the model increasingly acts as a co-developer and operator for offensive tradecraft, where defenders are getting stopped when asking simple analysis questions.&lt;/p&gt;&lt;p&gt;Defenders are often stuck fighting the safety rails. Ask a model to help analyze a piece of malware or break down how an exploit works, and there’s a decent chance you’ll get a refusal or a heavily sanitized answer. The irony is hard to miss: the same guardrails meant to prevent misuse are often slowing down the people trying to defend systems, where the attackers are using the readily available, professional models today at blazing speeds to auto-hack.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/s1024/AI_Agent_Hydra.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/w640-h640/AI_Agent_Hydra.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/6825164890668381113/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6825164890668381113' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6825164890668381113'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6825164890668381113'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/03/defensive-refusal-bias-in-llms-is.html' title='Defensive Refusal Bias in LLMs is Hurting Infosec'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeN7P5eWXq36_8vFmRtxkM7lKB28ltzOKD3NAo2hzQY9KGuL8aAZ8xxVN_xvi4PfDaqYqepL6cLq2iA4sYDk8DmQsF4dtHYeEKpNarEUq-iXojjDaiIqmErYUmgSXW0glXJ2TzTlWp717_jmKtUTNGfwOpAZul9_pjqyXHjwu16Gku4cKV820ZxPA21SH7/s72-w640-h640-c/AI_Agent_Hydra.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4628652852281526248</id><published>2026-03-04T08:40:00.000-08:00</published><updated>2026-03-04T08:40:19.498-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="agent swarm"/><category scheme="http://www.blogger.com/atom/ns#" term="agents"/><category scheme="http://www.blogger.com/atom/ns#" term="ALCCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="CCDC"/><category scheme="http://www.blogger.com/atom/ns#" term="collective pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="collectives"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="virtual ccdc"/><title type='text'>ALCCDC 2026 Review</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/s1536/RedvsBlue.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1536&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/w400-h266/RedvsBlue.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This was another amazing year for At Large CCDC, or Virtual CCDC as I&#39;ve come to call it. We had our event this last weekend, Feb 28th and March 1st. I lead the red team again this year (&lt;a href=&quot;https://lockboxx.blogspot.com/2025/03/alccdc-2025-review.html&quot;&gt;last year&#39;s writeup faithful reader&lt;/a&gt;) and the core CIAS team hosted the environment for teams to attack/defend. Overall the competition was intense and engaging. We had 5 blue teams this year and just around 10 individual red teamers. We played zone, in the sense that we essentially hacked across all the teams in an equal manner, targeting specific services with sweeping exploits and laying down equivlent persistence. This is opposed to &quot;man-to-man&quot; or playing in a way where we pair specific red team members to specific blue teams, much the way we do nationals.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This year Dakota state won again. It wasn&#39;t even really that close, they are getting really good. I would go out to say Dakota state dominated, playing a near perfect game relative to the other teams. I would also say the remaining teams were fairly closely grouped, with the next two teams being fairly equivalent in the middle, and the last two teams being fairly equal in last. I would argue the other teams should do their best to learn from the &lt;a href=&quot;https://defsec.club/doku.php?id=ccdc_checklist&quot;&gt;DSU playbook&lt;/a&gt;, because it is a &lt;a href=&quot;https://github.com/DSU-DefSec/ace&quot;&gt;winning model&lt;/a&gt;. They have a &lt;a href=&quot;https://github.com/DSU-DefSec/DWAYNE-INATOR-5000&quot;&gt;ton of infra&lt;/a&gt; for hosting your own CCDC-style attack and defense competition. There are a ton of great resources there for up-ing your personal game and emulating the way DSU plays.&amp;nbsp;&lt;/p&gt;&lt;p&gt;On to what I really want to write about from a pentest perspective. The competition is becoming dominated by AI written tooling, agents, and agent swarm pentesting. I&#39;m not convinced yet, often times these tools are much sloppier, more reckless, and harder to control. If you thought pentesters were reckless and hard to control these agent swarms are so much worse. They also do incredibly obvious and silly things that will easily get caught, in an adversarial competition you can&#39;t really afford to make those kinds of silly mistakes. One person suggested it was because these haven&#39;t been post-tuned in a real world environment and thus were not battle tested. I would need to see these things get remarkably better from an operator perspective before allowing them again, they often don&#39;t apply attacks evenly or fairly which is a key feature of our red team at CCDC. Further, I wonder if they could understand how well a blue team is doing and adapt their attacks to level of skill. Regardless, it&#39;s a trend I want to comment on. From what I’ve observed so far, AI-enabled pentesting tools generally fall into two categories.&lt;/p&gt;&lt;p&gt;1. AI-Assisted Tool Development&lt;/p&gt;&lt;p&gt;The first approach uses AI like Claude Code to help write pentesting tools. Operators prompt a model to generate scripts, exploit logic, automation helpers, or reconnaissance tooling. The human still controls the attack, but AI accelerates the process of building the tools. Sometimes the model is helping set up the project directly, but I find it&#39;s often more productive when the human does the architecting and guides the features they want, and simply uses the AI to script the advanced features, like an LKM in-memoery loader, or similar features, as opposed to using the LLM to guiding those features. These systems tend to work quite well. In fact, some of the most interesting tooling I’ve seen recently has come from this approach. You get creative automation and rapid tool development without sacrificing operator control. This results in stable tools are develop quickly with extremely powerful features.&amp;nbsp;&lt;/p&gt;&lt;p&gt;2. AI-Pentester Operator Agent Swarm&lt;/p&gt;&lt;p&gt;The other approach I&#39;ve seen uses AI agents that do the cognition and drive the tools. These tend to be more unhinged, and I imagine burn thousands of tokens just in the cognition of the attacks, which feels like less sustainable than using the tokens to write the tool. These are the systems that tend to behave the most erratically. Even the agent swarms that abstract the cognition through layers of agents have issues, such as sub-agent permissions, logging, runaway tasks, emergent behavior, and several other operational challenges that become very apparent once these systems are running in a live adversarial environment. I think a lot of the &lt;a href=&quot;https://techcrunch.com/2025/06/28/anthropics-claude-ai-became-a-terrible-business-owner-in-experiment-that-got-weird/&quot;&gt;Claudius experiments&lt;/a&gt; show this, as powerful, amazing, and fast as the agents are they just aren&#39;t there yet in terms of planning and metacognition. Models are almost always better when you give them very narrow tasks, and thats what the agent swarm attempts to do, break up the the scope of the tasks into smaller, and smaller context windows of focused tasks. On top of that, the second approach feels like it just burns tokens in a crazy way, especially when the agent swarm becomes misfocused or off-task.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I will have a lot more thoughts on these tools and this evolution of pentesting in the coming weeks to months. Stay tuned and let me know in the comments if you have thoughts or find this content interesting&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4628652852281526248/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4628652852281526248' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4628652852281526248'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4628652852281526248'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/03/alccdc-2026-review.html' title='ALCCDC 2026 Review'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0oZoeEA-EYp-kY2mOnBTp1-X04gcC3ytDCjBKh7Q3fhGYlVKiZMhqB3PzynhDInwpEQzSP8xTHoQ79kgZ5tAG8cOFj6iOi7ilphEhPGytnmPq1vyUHOwtXLvnZ9PJnQivuYiIIuB3zHObTOnCLrPt5NvH1igboKYz7HyYCgYasYmchJ7drg6xiw0e0PEe/s72-w400-h266-c/RedvsBlue.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4066569547606047964</id><published>2026-02-15T14:32:00.000-08:00</published><updated>2026-02-16T12:39:38.847-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="conference"/><category scheme="http://www.blogger.com/atom/ns#" term="ctfs"/><category scheme="http://www.blogger.com/atom/ns#" term="denver"/><category scheme="http://www.blogger.com/atom/ns#" term="electronic badges"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="Mile High"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Trainings"/><category scheme="http://www.blogger.com/atom/ns#" term="Wild West Hacking Fest"/><title type='text'>Wild West Hacking Fest Review (Denver 2026)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/s2560/WWHF_Final_3.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1978&quot; data-original-width=&quot;2560&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/w400-h309/WWHF_Final_3.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We just wrapped this year&#39;s &#39;Mile-High&#39; Wild West Hacking Fest. This was my second time attending the Denver event (distinct from the Deadwood conference), and the growth year over year has been impressive (&lt;a href=&quot;https://lockboxx.blogspot.com/2025/02/my-first-wild-west-hacking-fest-denver.html?q=Wild+West+hacking+Fest&quot;&gt;read about the first one here&lt;/a&gt;). It keeps the laid-back, community-driven vibe that made it great to begin with, but the conference experience itself has leveled up in a big way. I personally like this one (over Deadwood) as I think it&#39;s much more accessible in downtown Denver, although I&#39;ve never actually been to the other event. There are so many amazing features of this conference I want to highlight.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;To start, the conference app deserves a callout. It’s wasn&#39;t just a flat / static schedule, you can browse, and even watch presentations streamed live. If you can’t physically make it to a session, you can still follow along. That level of accessibility really sets it apart.&amp;nbsp;They also run an active Discord server with dedicated channels for every track, workshop, and game. Slides get shared in real time, and conversations continue well beyond the talk itself. It makes Q&amp;amp;A more engaging and helps you connect with other attendees organically. I even joined a pickup team through Discord to compete in a CTF later.&lt;br /&gt;&lt;br /&gt;I definitely want to highlight the pre-conference training as it was amazing. You can read &lt;a href=&quot;https://lockboxx.blogspot.com/2026/02/course-review-breaching-cloud-with-beau.html&quot;&gt;my review here&lt;/a&gt;. Not only do they offer dedicated training before the conference, but the trainings are also streamed over the app. There are also free workshops during the event that anyone can drop into. And the content spread is excellent. There are advanced sessions diving deep into topics like shellcode curation, alongside beginner-friendly talks and workshops for those newer to the field. It was nice to see the conference strike more of a balance this year.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Speaking of a better skill spread, there were three CTFs this year and felt like something for everyone. There was an intro CTF, an electronic badge challenge, and a full Attack/Defense competition. I think this was really nice as people could engage at any level of experience.&amp;nbsp; Beyond the talks and CTFs, there’s was a very lively vendor area, plus some seriously fun lockpicking challenges. The speed-picking competition alone is worth watching as people get intensely competitive.&lt;/p&gt;&lt;p&gt;It also still feels really small. With roughly 300–500 attendees across just two floors of a single hotel, it feels intimate and approachable. You can strike up conversations with speakers, organizers, and fellow attendees without fighting crowds. It reminds me of the old DerbyCon days, tight-knit, accessible, and community-focused, but with even more structured content and activities.&lt;/p&gt;&lt;p data-end=&quot;2901&quot; data-start=&quot;2681&quot;&gt;If you’re looking for a conference that combines strong technical content, hands-on activities, real community engagement, and a relaxed atmosphere, you should seriously consider going to Mile-High Wild West Hacking Fest, It’s one of the few events that still feels small in the best possible way, while delivering a big-conference experience.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4066569547606047964/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4066569547606047964' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4066569547606047964'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4066569547606047964'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/02/wild-west-hacking-fest-review-denver.html' title='Wild West Hacking Fest Review (Denver 2026)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrcg3G5sIlOdxKOG9_jaKEOL2hQvERCOvQVBo7Xw-G17aHj0Y4BTurPKUdCwrDSZU8euhV_XikMqGF0030q-i533O5agjYd1qv7WcQjzaMzaGDAK5RiapMWh2UwCsXOVF1CGytmGzmTwX77txnBDZKnd0cAaOoz38tAMYWtoHlNnB5UJbn4FwsaRNsys3G/s72-w400-h309-c/WWHF_Final_3.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4576834103311158923</id><published>2026-02-12T09:22:00.000-08:00</published><updated>2026-02-12T12:35:46.466-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="aws"/><category scheme="http://www.blogger.com/atom/ns#" term="azure"/><category scheme="http://www.blogger.com/atom/ns#" term="Beau Bullock"/><category scheme="http://www.blogger.com/atom/ns#" term="Breaching the Cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="GCP"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Team"/><category scheme="http://www.blogger.com/atom/ns#" term="Wild West Hacking Fest"/><title type='text'>Course Review: Breaching the Cloud With Beau Bullock</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/s686/breaching_the_cloud.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;386&quot; data-original-width=&quot;686&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/w640-h360/breaching_the_cloud.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;I recently took an Antisyphon training,&amp;nbsp;&lt;a href=&quot;https://www.antisyphontraining.com/product/breaching-the-cloud-with-beau-bullock/&quot;&gt;Breaching the Cloud With Beau Bullock&lt;/a&gt;, at the &lt;a href=&quot;https://wildwesthackinfest.com/wild-west-hackin-fest-mile-high-2026/&quot;&gt;Mile High Wild West Hacking Fest 2026&lt;/a&gt;. I thought this was a fantastic training for intermediate infosec practitioners, and want to detail a few reasons why. The training was very cheap compared to other industry trainings, with most SANS or black hat trainings ranging from 2-5k. This course comes in around &lt;b&gt;$575&lt;/b&gt; which makes it similar to trainings like &lt;a href=&quot;https://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender_30.html&quot;&gt;The Certified Cyber Defender&lt;/a&gt; in terms of price and access (its also available on demand). That alone makes it accessible in a way most “elite” trainings simply aren’t. You do get a certificate of completion for this, but unlike the CCD because there is no exam it doesn&#39;t hold too much weight in terms of a verification that the person knows the material. That said, certificates are always nice to get along w/ the sticker price. One aspect I wanted to callout is that Beau goes pretty fast through the content, and there is a ton of content. There are over 420+ slides and 18 hands-on labs throughout the course. The course is only 2 days of in-person, so I get why he has to go fast. Personally, I like it because it is enough to cover the material but let students dig in on their own time if they want more. As a pretty experienced infosec practitioner, a decent amount of the material was also review for me, so it was nice to rip through it from that perspective as well. The material is modern and relevant, comfortably within the last 2–5 years of cloud pentesting tradecraft. This isn’t recycled theory or checkbox cloud security, the course is packed with high-impact tools and techniques for initial access, cloud-native reconnaissance, lateral movement, and privilege escalation across real cloud environments.&amp;nbsp;The course is dense with practical tooling and techniques: tons of scanners, identifying cloud-native weaknesses, pivoting through an organizations roles, and understanding where identity and access failures really hurt. There’s very little time wasted on low-impact “cloud vulnerabilities” that look scary in a scanner report but don’t meaningfully move an engagement forward. This is&amp;nbsp;&lt;a href=&quot;https://medium.com/@haarlems/review-of-antisyphon-on-demand-trainings-671866aaf15c&quot;&gt;another great review&amp;nbsp;&lt;/a&gt;that really encapsulates that, &quot;You&#39;re paying for the experience of the instructor&quot;, not simply more rote pentesting content. And Beau is one of the best operators that has been doing this for several decades, so his hands on experience really cuts through a lot of the fluff out there. In my typical review style, the following are the hands on labs in the course to help you get a better understanding of the content:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Lab 1: S3 Bucket Pillaging&lt;/li&gt;&lt;li&gt;Lab 2: Password Spraying&lt;/li&gt;&lt;li&gt;Lab 3: Pillage Code Repos for Secrets&lt;/li&gt;&lt;li&gt;Lab 4: Microsoft Device Code Phishing&lt;/li&gt;&lt;li&gt;Lab 5: Azure Situational Awareness&lt;/li&gt;&lt;li&gt;Lab 6: Backdooring an AWS Account&lt;/li&gt;&lt;li&gt;Lab 7: Azure Service Principal Backdoor&lt;/li&gt;&lt;li&gt;Lab 8: Using AzureHound to Find PrivEsc&lt;/li&gt;&lt;li&gt;Lab 9: AWS Privilege Escalation w/ Pacu &amp;amp; Obtaining Web Console Access&lt;/li&gt;&lt;li&gt;Lab 10: ScoutSuite AWS Scanning&lt;/li&gt;&lt;li&gt;Lab 11: Screenshot Web Services&lt;/li&gt;&lt;li&gt;Lab 12: Exploiting SSRF to Gain IAM Keys&lt;/li&gt;&lt;li&gt;Lab 13: Extract Password Hashes from VM Storage&lt;/li&gt;&lt;li&gt;Lab 14: Dumping Azure Key Vaults&lt;/li&gt;&lt;li&gt;Lab 15: Exploiting Amazon Elastic Container Service (ECS)&lt;/li&gt;&lt;li&gt;Lab 16: Exploiting AWS Lambda Functions&lt;/li&gt;&lt;li&gt;Lab 17: Azure App Services Phishing w/ Illicit Consent Grant&lt;/li&gt;&lt;li&gt;Lab 18: ROADTools Entra ID Analysis w/ CAPS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The course has a big focus on both Azure and AWS. Many cloud classes go deep on a single provider and leave students mentally trapped there. This one does a good job showing the parallels, how the same underlying identity, application settings, and misconfiguration patterns appear across cloud platforms. I found there was a decent bit of overlap with FalconForce&#39;s &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2025/08/course-review-advanced-detection.htm&quot;&gt;Advanced Detection Engineering in the Enterprise&lt;/a&gt;&quot;, in terms of some of the offensive cloud techniques presented, although that had more of a focus on the defensive techniques and it was only looking at Azure. I really like that the course gave you a lot of custom terraform such that you could host the testing environments yourself. You’re not just clicking through someone &lt;span style=&quot;font-family: inherit;&quot;&gt;else’s&lt;/span&gt; pre-baked lab, you’re learning how these environments are actually built, broken, and you could even fix the vulns yourself. The course also heavily leveraged &lt;a href=&quot;https://github.com/RhinoSecurityLabs/cloudgoat&quot;&gt;CloudGoat&lt;/a&gt; for some terraformed vulnerable cloud environments, which is an absolutely fantastic project that I also leveraged in &lt;a href=&quot;https://lockboxx.blogspot.com/2024/02/cptc-2023-finals-review.html&quot;&gt;CPTC2023&lt;/a&gt;&amp;nbsp;and while training for my &lt;a href=&quot;https://lockboxx.blogspot.com/2022/12/aws-certified-security-specalist.html&quot;&gt;AWS Cloud Specalist cert&lt;/a&gt;. The class even covers many parallels with GCP, although it doesn&#39;t have us host any GCP infrastructure to pentest.&amp;nbsp;There’s also strong coverage of cloud-to-on-prem and on-prem-to-cloud attack paths, which is where real organizations still get burned. This isn’t cloud-in-a-vacuum theory, it’s hybrid red teaming grounded in real world examples. While the course doesn&#39;t implement a ton of best practices in it&#39;s own lab setup, Beau makes a point of highlighting good cloud theory in terms of the envs we are pentesting and the recommendations. The labs modeled proper group structure and role assumption workflows the way large organizations actually operate. The slides also cover the use of secrets managers and key vaults instead of hardcoded credentials or lazy storage patterns. Theres also a ton of coverage on cloud specific technologies, like writing security policy in AWS or leveraging Entra ID for better subscription management.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Ultimately, I highly recommend this course for both the price point and the instructor. The emphasis stays squarely on high-impact red team tradecraft: identity abuse, role chaining, secrets exposure, cloud-to-on-prem boundary crossing, and realistic privilege escalation paths inside mature environments. These are the techniques that materially change the outcome of an engagement. They’re practical, repeatable, and aligned with how real organizations actually operate. There’s a noticeable absence of fluff. The content doesn’t wander into obscure edge cases or theoretical attack paths that rarely survive contact with production environments. Instead, it concentrates on methods that consistently produce leverage. That curation is intentional and it reflects experience. When an instructor has spent decades operating in the field, the signal-to-noise ratio improves dramatically. You get the attacks that work, the patterns that scale, and an understanding of cloud patterns that comes from doing the job repeatedly.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnaGCJEkMYWJF8bRH2FQE70fe5jJucNWj03RkNvLtsrryHyBDaWmi0eRcvpj_W6upUBqiStWq-A9E3aQiqGL_YlyTbyagr-EZDZZDXPjVU4NznQxeHIGf8TjQQmManFL1Fz5UfWUEGwaq-84HrDP_3uqd1whHxh1xqMWuKpk3YYnMA4NA9wseIbYn1nO3b/s2170/btc.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1672&quot; data-original-width=&quot;2170&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnaGCJEkMYWJF8bRH2FQE70fe5jJucNWj03RkNvLtsrryHyBDaWmi0eRcvpj_W6upUBqiStWq-A9E3aQiqGL_YlyTbyagr-EZDZZDXPjVU4NznQxeHIGf8TjQQmManFL1Fz5UfWUEGwaq-84HrDP_3uqd1whHxh1xqMWuKpk3YYnMA4NA9wseIbYn1nO3b/w400-h309/btc.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4576834103311158923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4576834103311158923' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4576834103311158923'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4576834103311158923'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/02/course-review-breaching-cloud-with-beau.html' title='Course Review: Breaching the Cloud With Beau Bullock'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVbUwB2Njo1IYDKi2VOACN1VK7Ee0VsQmJdlyGZQkC-74ayqYexeE8Ho9frTCyFlPCAQvbrY0OQHIT8pwtk8eOeU4Irse9LP9YGNHXLaSS8NqXeVWywGN4dPN3AcGaaRjs9x5GNFIrW8FOHHuZRatHwFOOWIwTzFGCW3VRaXlxYf3OqTx2wJof3Ln4PKa0/s72-w640-h360-c/breaching_the_cloud.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-2500350876588133471</id><published>2026-01-28T07:39:00.000-08:00</published><updated>2026-02-11T07:40:54.627-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="100 deadly skills"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="MI6"/><category scheme="http://www.blogger.com/atom/ns#" term="Red Team"/><category scheme="http://www.blogger.com/atom/ns#" term="spy"/><title type='text'>Book Review: &quot;MI6 Spy Skills For Civilians&quot;</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/s1000/mi6spyskills.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;647&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/w259-h400/mi6spyskills.jpg&quot; width=&quot;259&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&quot;MI6 Spy Skills For Civilians: A Former British Agent Reveals How to Live Like A Spy - Smarter, Sneakier, and Ready for Anything.&quot; by Red Riley is an interesting book that explores some espionage tradecraft. I’m not going to lie, I picked this book up at SpyScape NYC, which is a super fun augmented-reality arcade and spy museum in Manhattan (New York City). I read the book casually over a few days, mostly browsing through the various tips and tricks rather than reading it straight through. I paid&amp;nbsp;&lt;a href=&quot;https://www.amazon.com/Mi6-Spy-Skills-Civilians-real-life/dp/1948174405&quot;&gt;roughly $17 for the book&amp;nbsp;&lt;/a&gt;in person, and honestly, I wouldn’t really recommend it to anyone. Overall, I’d give this book 3 out of 10 stars. While it does seem grounded in some real techniques, the emphasis and tone surrounding those techniques feel extremely off. There are far better books available for this type of learning. If the book took itself more seriously, it could make for a solid coffee table book or a conversation starter. As it stands, I think I’d just end up cherry-picking a few useful points rather than revisiting it as a whole.&amp;nbsp;I picked this book up hoping it would be like &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2023/01/book-review-osint-techniques.html&quot;&gt;OSINT Techniques&lt;/a&gt;&quot;, &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2017/10/book-review-spycraft.html&quot;&gt;Spycraft&lt;/a&gt;&quot; or &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2018/10/book-review-craft-of-intelligence.html&quot;&gt;The Craft of Intelligence&lt;/a&gt;&quot; but rather I think this book sells itself less as a serious spy skill book and more as a flashy Hollywood spy book. I think this book tries to sell itself like Clint Emerson&#39;s &quot;&lt;a href=&quot;https://lockboxx.blogspot.com/2021/07/book-review-100-deadly-skills.html&quot;&gt;100 Deadly Skills&lt;/a&gt;&quot;, but &quot;MI6 Spy Skills&quot; comes off as overly flashy whereas &quot;100 Deadly Skills&quot; comes off as practical in the field. The book constantly references James Bond films, both visually and in how it describes the “danger” agents supposedly face. It’s honestly a bit ludicrous to suggest that the average intelligence officer is regularly getting into life-or-death fistfights while traveling on a train in a foreign country. In reality, that would represent a worst-case scenario. The last thing any real agent wants is a physical confrontation or the attention of law enforcement or any other authority figures. In my typical style the following are the sections and chapters of the book:&lt;br /&gt;&lt;br /&gt;Chapter 1: Personal Image&lt;br /&gt;Chapter 2: Avoiding Surveillance&lt;br /&gt;Chapter 3: Mobile Surveillance&lt;br /&gt;Chapter 4: Travel&lt;br /&gt;Chapter 5: Dead Letter Boxes&lt;br /&gt;Chapter 6: Brush Contacts&lt;br /&gt;Chapter 7: Self-Defense&lt;br /&gt;Chapter 8: Innocuous Weapons&lt;br /&gt;Chapter 9: Natural Weapons&lt;br /&gt;Chapter 10: Weapons Defense&lt;br /&gt;Chapter 11: Escape &amp;amp; Evasion&lt;br /&gt;Chapter 12: Subterfuge&lt;br /&gt;Chapter 13: Intelligence Gathering&lt;br /&gt;Chapter 14: Personal First Aid&lt;br /&gt;Chapter 15: Basic Agent Extraction&lt;br /&gt;Chapter 16: Advanced Insertion &amp;amp; Extraction&lt;br /&gt;Chapter 17: Other Helpful Tips &amp;amp; Techniques&lt;p&gt;&lt;/p&gt;&lt;p data-end=&quot;3319&quot; data-start=&quot;2900&quot;&gt;Some of the best, and most practically useful, content for red teamers appears in the chapter on &lt;strong data-end=&quot;3013&quot; data-start=&quot;2995&quot;&gt;Brush Contacts&lt;/strong&gt;, in my opinion. These sections contain genuinely useful ideas and were one of the main reasons I picked the book up after thumbing through it. Tips such as waiting near elevator banks, escalators, or bus stops can be genuinely effective locations for brush contacts or even cloning physical access badges. This chapter, along with others like the one on dead drops, really emphasizes that parts of the book are grounded in real-world experience. Unfortunately, that grounding is undermined by the nearly 50+ pages devoted to improvised weapons and hand-to-hand combat, which make the book feel unrealistic and far more like Hollywood spy fiction. Don’t get me wrong, this approach probably sells well to the uninitiated. But real intelligence work is often incredibly boring. It usually involves observation, pattern tracking, and note-taking week after week, with very little actually happening. Most agents never want to engage in physical altercations, and many would consider a mission compromised if one occurred at all. That said, there &lt;em data-end=&quot;4064&quot; data-start=&quot;4059&quot;&gt;are&lt;/em&gt;&amp;nbsp;some good or common-sense tips scattered throughout the book. The guidance on remaining inconspicuous is fairly solid: things like wearing non-distinct clothing, never running, avoiding looking over your shoulder, and minimizing unnecessary interactions. The advice to change your outfit and approach routes when revisiting a location for reconnaissance is also sound. Still, the majority of the book feels like it’s pretending to be an action-movie secret agent manual rather than providing skills actual agents would find useful. I was also surprised by the near total absence of computer skills or technical tradecraft, especially given how central cyber operations are to modern intelligence work. No video for this one, just a friendly reminder that overly flashy and embellished techniques are rarely as real or practical as the boring, non-sexy ones. You should always be wary of anyone claiming to do intelligence work while presenting it like they’re some kind of 007.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/2500350876588133471/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/2500350876588133471' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/2500350876588133471'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/2500350876588133471'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2026/02/book-review-mi6-spy-skills-for-civilians.html' title='Book Review: &quot;MI6 Spy Skills For Civilians&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRcQ6DCZNb2Lhda1BKKSsarBjXkVnaPMDCq6RmCrTWKhqHqYGXs3UEhyphenhyphen0dTCLqTloG2RUdZf-beSK2ALycHlk9L-btiUmSKHKEY7i_tY2XQirKIzHITLF6YMuwEE3KPHUSGUU_R3jiLDENsOZ200uodNMBsneL86_kTohZsAPUz20UTvRPAq2PeLGmbqDS/s72-w259-h400-c/mi6spyskills.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7693205593225584757</id><published>2025-12-30T02:25:00.000-08:00</published><updated>2025-12-30T02:34:53.831-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blue team"/><category scheme="http://www.blogger.com/atom/ns#" term="Bootcamp"/><category scheme="http://www.blogger.com/atom/ns#" term="CCD"/><category scheme="http://www.blogger.com/atom/ns#" term="cert"/><category scheme="http://www.blogger.com/atom/ns#" term="Exam"/><category scheme="http://www.blogger.com/atom/ns#" term="forensics"/><title type='text'>Course Review: Certified CyberDefender (CCD)</title><content type='html'>&lt;p&gt;I recently passed the &lt;a href=&quot;https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/&quot;&gt;Certified CyberDefender&lt;/a&gt; (CCD). Ultimately I think there is a lot of value in this certification and I think it finds a unique spot within the industry.&amp;nbsp;If you treat CCD as a hands-on validation of blue-team and DFIR skills, it performs well. It&#39;s almost like a blue team version of the OSCP, which is funny considering the slogan on the challenge coin is, &quot;Defend Smarter, Not Harder&quot; (vs the classic offensive slogan, &quot;Try Harder&quot;). The combined cost of the labs and exam are approximately &lt;b data-end=&quot;933&quot; data-start=&quot;922&quot;&gt;$499.99&lt;/b&gt;, which I consider very reasonable given the scope and hands-on nature of the material. I spent roughly&lt;b&gt; &lt;/b&gt;&lt;span data-end=&quot;1078&quot; data-start=&quot;1037&quot;&gt;one week reviewing the course content&lt;/span&gt;, followed by &lt;span data-end=&quot;1137&quot; data-start=&quot;1092&quot;&gt;four additional days working through labs&lt;/span&gt; before attempting the exam. However this may be an accelerated rate for people that are newer to the subject material. The exact &lt;a href=&quot;https://cyberdefenders.org/static/files/CCD_Syllabus.pdf&quot;&gt;contents of the course is here&lt;/a&gt;, so you can make sure this specific skill development is what you are looking for.&lt;/p&gt;
&lt;p data-end=&quot;1360&quot; data-start=&quot;1167&quot;&gt;From a return-on-investment perspective, the labs alone justify the price. Even experienced practitioners will find value in the scenarios, tooling exposure, and repetition across environments.&amp;nbsp;The scenarios require investigation, hypothesis testing, and iterative analysis, much closer to real SOC or DFIR work than most other certifications. If you approach them like a real incident, with partial visibility and incomplete information, they feel authentic and worthwhile. I also like how most of the training has detailed instructions, followed by videos demonstrating the techniques, and finally a lab environment for participants to then try themselves. That said, some of the material and theory leaves a bit to desired. I wrote about some of this in &lt;a href=&quot;https://lockboxx.blogspot.com/2025/12/course-review-certified-cyberdefender.html&quot;&gt;my IR review&lt;/a&gt;, I&#39;m talking about getting basic formulas for Risk incorrect or muddling the incident response lifecycle.&amp;nbsp;The full course has similar issues, for example it instructs students to perform live response exercises like log collection and live system triage before capturing memory. In my experience you always want to capture memory first before running more live response tools as they can push evidence out of memory.&lt;br /&gt;&lt;br /&gt;Still I thought this exam was great. I like the 48 hour nature of the exam, as well as the multiple sections and environments. This kept it fresh, if I got bored or stuck in one area it was easy to pivot and keep solving challenges. I also appreciated that the exam didn’t artificially gate progress behind single points of failure. My bottom line on this is that the exam is solid for testing hands-on forensic competence across multiple domains. The labs and exam are well worth the time and cost, and the exam format is among the better designs I’ve seen for blue-team certifications.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/s6600/CCD.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;5100&quot; data-original-width=&quot;6600&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/w400-h309/CCD.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/7693205593225584757/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7693205593225584757' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7693205593225584757'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7693205593225584757'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/12/course-review-certified-cyberdefender_30.html' title='Course Review: Certified CyberDefender (CCD)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSL8dsw6DUbZq01PdGRn9syPr8j3lKOpGdvUCOYVXqfg0EehAf7GTYxps3HEaqkmCjskyIucqqwWdRBuRuBQvlRgZ1HV7csxdSGC0AoSNgMchSLcSS7lRbBM3GUUMRooIEyUC2VYAEXNaA4_gveBNtRCzUiqEs0V9r1pyNrGvNGcDasx3HPvT-ZMYaQeAF/s72-w400-h309-c/CCD.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7966825381811647833</id><published>2025-12-17T08:03:00.000-08:00</published><updated>2025-12-17T08:03:44.379-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="planning"/><category scheme="http://www.blogger.com/atom/ns#" term="strategy"/><title type='text'>Book Review: &quot;Good Strategy / Bad Strategy&quot;`</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/s1000/good_bad_strategy.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;658&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/w264-h400/good_bad_strategy.jpg&quot; width=&quot;264&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Good Strategy / Bad Strategy&quot; by Richard Rumelt is one of the clearest distinctions on what strategy is not that I&#39;ve encountered. Its very illuminating for anyone caught in melancholy of normal corporate planning cycles. It&#39;s a very solid book on how to avoid bad strategy or what the difference is beyond just goal setting. This book attempts to answer how we carve real strategy out of our strengths and opportunities. It tries to take on the challenge of how we get an advantage when accomplishing our goals. One of the classic pitfalls in planning is simply setting forth a dog&#39;s dinner in terms of objectives that are hard to hit and don&#39;t lend themselves to any type of advantage in that work. I listened to the book on Audible for over 10 hours at essentially $15 or 1 credit. Overall I give it 6 out of 10 stars, for being eye-opening but ultimately lacking to build a clear path out of it&#39;s own problem statement. I recommend it to anyone involved in strategic planning or planning in general as I think it is valuable recognizing bad strategy at play. Despite my criticisms that the book doesn&#39;t help prepare a strategy, knowing what not to do actually greatly improves the planning process. The book really succeeds in sharpening your strategic eye. Even if it doesn&#39;t lay out a methodical process for carving out strategy, it does make you question the effectiveness and strategy of your methods, forcing you to re-evaluate until you land at a better place. In that sense, it really lends itself to red teaming your strategy, looking at it from multiple perspectives and finding both advantages and weakness in the approach. In my typical style, the following are the chapters of the book:&lt;br /&gt;&lt;br /&gt;Introduction: Overwhelming Obstacles&lt;br /&gt;&lt;b&gt;Part I: Good and Bad Strategy&lt;/b&gt;&lt;br /&gt;Chapter 1: Good Strategy is Unexpected&lt;br /&gt;Chapter 2: Discovering Power&lt;br /&gt;Chapter 3: Bad Strategy&lt;br /&gt;Chapter 4: Why So Much Bad Strategy?&lt;br /&gt;Chapter 5: The Kernel of Good Strategy&lt;br /&gt;&lt;b&gt;Part II: Sources of Power&lt;/b&gt;&lt;br /&gt;Chapter 6: Using Leverage&lt;br /&gt;Chapter 7: Proximate Objectives&lt;br /&gt;Chapter 8: Chain-Link Systems&lt;br /&gt;Chapter 9: Using Design&lt;br /&gt;Chapter 10: Focus&lt;br /&gt;Chapter 11: Growth&lt;br /&gt;Chapter 12: Using Advantage&lt;br /&gt;Chapter 13: Using Dynamics&lt;br /&gt;Chapter 14: Inertia and Entropy&lt;br /&gt;Chapter 15: Putting it Together&lt;br /&gt;&lt;b&gt;Part III: Thinking Like a Strategist&lt;/b&gt;&lt;br /&gt;Chapter 16: The Science of Strategy&lt;br /&gt;Chapter 17: Using Your Head&lt;br /&gt;Chapter 18: Keeping Your Head&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The book shows a lot of anecdotal examples of strategies that don&#39;t work. The book is big on calling out the misnomer that strategies have been set or applied when in reality there is no actual overarching strategy. The book talks about the active planning cycle and setting conscious thought into how to go about thinking or planning not just accomplishing the goals. I actually thought this was a little too anecdotal. I would have preferred a more repeatable approach to carving out strategies from planning routines. I would have preferred tips and tricks to analyzing a situation for an an advantage, perhaps some principles that could be leveraged in the planning process to better one those muscles or efforts. The book showed me a lot of what not to do, but left me wanting in terms of how to actually plan and formulate an advantage in a scientific way. Ultimately, the book showed more of what not to do, rather than what to do, which still had a ton of value in terms of planning. While the book also anecdotally mentions some entrepreneurs who found great strategic success in iterating or experimenting on their ideas, the book also downplays these motions as a tactic for refining and battle-testing a strategy. The role of experimentation, iteration, and feedback loops can&#39;t be understated in domains that require strategy to win. Further, there is often an adversarial component involved in domains where strategy matters more than an engineering plan. In those environment especially it is important to make sure your strategy remains dynamic and adaptable to environmental or situational feedback. If something works or stops working listening to that feedback can be some of your biggest strategic advantage in some environments.&amp;nbsp;&amp;nbsp;The following is Richard discussing strategy on a podcast. Some of the concepts in the interview come from his newer books, but the interview is great so enjoy!&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/4uWKEG0s9Kc?si=1JxUVZd0Eshns_GC&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/7966825381811647833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7966825381811647833' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7966825381811647833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7966825381811647833'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/12/book-review-good-strategy-bad-strategy.html' title='Book Review: &quot;Good Strategy / Bad Strategy&quot;`'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCuzKEfJbmvJLZwIjwXi1cCSFJ6K0-RspXhj6PIp7M3qATErSB5Kg4yzDc557HxTTnNW6xa4PbWiCrECrugYO42HRQ-FmLGXvPRCyMTuFGzrL1X_tgLi7u6buyDDq4rZgOnCgFsGPf_6hh6F3O37MCoa99Xfk1DvqTzJSBTRNvxkSLXK_47lWnsuOZJ6WU/s72-w264-h400-c/good_bad_strategy.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-781889623762691737</id><published>2025-12-03T11:50:00.000-08:00</published><updated>2025-12-17T07:59:07.266-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blue team"/><category scheme="http://www.blogger.com/atom/ns#" term="certified CyberDefender"/><category scheme="http://www.blogger.com/atom/ns#" term="course review"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Defense"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Infosec"/><title type='text'>Course Review: Certified CyberDefender - Incident Response Optional Module</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/s345/Certified_CyberDefender.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;345&quot; data-original-width=&quot;294&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/w341-h400/Certified_CyberDefender.png&quot; width=&quot;341&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This review is only for the Incident Response module within the &lt;a href=&quot;https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/&quot;&gt;Certified CyberDefender course and labs&lt;/a&gt;. I plan on doing a full review of the course and certification after I take I sit for the test, but in the mean-time this a review of just the Incident Response Module, in the Optional Modules section. To be honest, this module is why I purchased the course in the first place, as I was looking for an Incident Response primer to roll out to my teams at work. TL;DR this specific module is not great, there is a lot that seems contrary to common cyber security advice, which I break down briefly in this review. While this entire training may prepare a SOC analyst for their day job, I wouldn&#39;t say this IR module would prepare someone for an actual Incident Response. To be honest, I found the incident response module very lacking, both wrong on several traditional definitions, as well as not as focused in terms of tradecraft, as I would like to see. As a result I am writing my own training for the team in conjunction with several industry peers, but i wanted to call out several of the reasons I wouldn&#39;t use this module as a formal training.&amp;nbsp; Lets start w/ some of the most egregious examples of getting traditional definitions wrong. Very early on in module they have a formula for Risk that seems very wrong.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;They state:&amp;nbsp;&lt;br /&gt;Risk = Threat x Vulnerability&lt;br /&gt;However the traditional equation from the field of Risk Analysis is:&lt;br /&gt;Risk = Likelihood x Impact&lt;br /&gt;&lt;br /&gt;It&#39;s a very weird definition to change even if they explain it their terms. By changing these definitions it risks training a new set of people on different definitions for no apparent reason. And this isn&#39;t a definition of risk that the security industry made up either, this was a formula that the security industry adopted from financial risk actuaries, so using security specific terms like threat and vulnerability really make less sense in that context.&amp;nbsp;Similarly when they break down the traditional three prime locations to do modern detection and log aggregation, they give four locations. The fourth domain comes from calling one area &#39;systems telemetry&#39; and another &#39;edge systems telemetry&#39;, seemingly drawing the distinction between internal network telemetry and the edge network analysis. I think this is a weird distinction to make and especially trivial in the context of an incident response effort, beyond maybe finding the root compromise. Further, when we do edge security analysis it often isn&#39;t traffic analysis such as netflow or pcap, it&#39;s typically application logs or en-mass observability statistics. In general the module puts a large focus on network analysis, which includes some really good labs, using tools such as Suricata, Zeek, Velocialraptor, and RITA. These are great and powerful tools for real network analysis and automated detection, although modern incident response has shifted to largely using EDR solutions and some kind of unified identity log collection. I would have really liked to see more tradecraft around tracking an incident, documented compromised hosts, and using this to fight an active infection. A bigger focus on reporting in general could be helpful as incidents often coincide with breaches and understanding the difference is often critical to an incident responders job. The layout of the content is also unclear and generally confusing. The website tries to break the module up by &quot;phases&quot; of the IR lifecycle, only chunked together. This would work if it stayed to it&#39;s own self defined phases, such as:&lt;br /&gt;&lt;br /&gt;Phase 1: Preparation&lt;br /&gt;Phase 2: Detection and Analysis&lt;br /&gt;Phase 3: Containment, Eradication, and Recovery&lt;br /&gt;Phase 4: Post-Incident Activity&lt;/p&gt;&lt;p&gt;But instead it jumps all around these topics, having random sections such as &quot;Remediation / Eradication&quot; and &#39;Restore, Validate, and Monitor&quot; in the middle of the previous phases, staying neither consistent in the naming nor the layout. The resulting module layout muddles the IR life cycle, how the engagement should proceed, and when to move between phases or apply different strategy. Finally the quizs are pretty simple for the IR module specific content, each 
quiz simply consists of 3 questions which you can challenge any number 
of times, making it an easy thing to blast through. That said, I can 
understand how the real test is supposed to be the certification exam, 
but seeing as how this is an optional module it would be nice to see 
real tests associated with this content. All that said, check back in as I challenge the certification and post a full review of the course. &lt;a href=&quot;https://theunsaltedcyberblog.medium.com/certified-cyberdefenders-ccd-2025-review-hands-on-blue-team-certification-for-dfir-soc-2832d2d1cdb3&quot;&gt;This other review&lt;/a&gt; I&#39;ve read says the course isn&#39;t for beginners and was rather difficult, but I&#39;ve actually found it great for those moving from novice with solid background into a SOC analyst role specifically. Check back soon!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/781889623762691737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/781889623762691737' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/781889623762691737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/781889623762691737'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/12/course-review-certified-cyberdefender.html' title='Course Review: Certified CyberDefender - Incident Response Optional Module'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpkqQNNPegXLlNq53qsL7YWyHTX2N9t2kA7VR-0_gNtZm5FKl32ulqkx-zgzV4JqPZfc3JAq26owRs0yW8x083ighrpULLoMtWaNSVY2HKHN12yekyww0XqXR8GBVmvdevuniFpHol6ngk3T-3wjY5nZWXVqZdYKgQ6JAWhvWgeqRnT_EJeCzTsjX-YZeK/s72-w341-h400-c/Certified_CyberDefender.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-8163569692260388670</id><published>2025-11-16T07:43:00.000-08:00</published><updated>2025-11-18T12:16:40.940-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="realistic"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="table top"/><title type='text'>Book Review: &quot;Cybersecurity Tabletop Execercises&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/s1000/tabletops.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;756&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/w303-h400/tabletops.jpg&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Cybersecurity Tabletop Exercises: From Planning to Execution&quot; by Robert Lelewski and John Hollenberger was an interesting book that I picked up at Ada&#39;s Technical Books in Seattle. Granted, I do a lot of table top exercises, at least four annually, so this is subject matter I know pretty well. Still I wanted to make sure I wasn&#39;t missing some big or new thing.&amp;nbsp;I paid &lt;a href=&quot;https://www.amazon.com/Cybersecurity-Tabletop-Exercises-Planning-Execution/dp/1718503822&quot;&gt;over $60 for this book new&lt;/a&gt; at only 150 pages, which feels pricey. My default pricing for books is typically $10 per 100 pages with lots of flexibility depending on the subject matter and presentation. Overall I give this 5 out of 10 stars. Frankly, I think it was overpriced and didn&#39;t offer any groundbreaking insights. There are also dozens of free resources from the &lt;a href=&quot;https://ttx.epa.gov/learn.html&quot;&gt;EPA&lt;/a&gt; to &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/2%20-%20CTEP%20Exercise%20Planner%20Handbook%20%282020%29%20FINAL_508_1.pdf&quot;&gt;CISA&lt;/a&gt; to a million easily digestible &lt;a href=&quot;https://www.alertmedia.com/blog/tabletop-exercises/&quot;&gt;blog posts&lt;/a&gt; that cover the same material, so the high sticker price really was a shocker to get that same content. The book is laid out such that the main book (Part 1) is really only about 100 pages of theory (and that feels like stretching it) and the following 50 pages (Part 2) are multiple examples and sample tabletop exercises. If you were mega tight on timing I could actually see grabbing this book for these canned scenarios. That said, there are also &lt;a href=&quot;https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages&quot;&gt;dozens&lt;/a&gt; of &lt;a href=&quot;https://www.cisecurity.org/insights/white-papers/six-tabletop-exercises-prepare-cybersecurity-team&quot;&gt;free table top exercises&lt;/a&gt; on the Internet.&amp;nbsp;The theory is also a bit light, as stated, you could learn much of this for free on the Internet. The following is the chapters of the book:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Part 1: The Tabletop Exercise Process&lt;br /&gt;&lt;/b&gt;Chapter 1: Why Perform Tabletop Exercises?&lt;br /&gt;Chapter 2: Planning the Tabletop Exercise&lt;br /&gt;Chapter 3: The Development Process: Where the Rubber Meets the Road&lt;br /&gt;Chapter 4: Facilitating a Successful Tabletop Exercise&lt;br /&gt;Chapter 5: Acting on What You&#39;ve Learned: Evaluation and Next Steps&lt;br /&gt;&lt;b&gt;PART II: Example Scenarios&lt;br /&gt;&lt;/b&gt;Chapter 6: Engaging a Technical Audience&lt;br /&gt;Chapter 7: Engaging a Executive Audience&lt;br /&gt;Chapter 8: Engaging the Business&lt;br /&gt;Appendix: Reporting Templates&lt;/p&gt;&lt;p&gt;Despite those previously mentioned shortcomings, the book does highlight a few things I think are worth calling out. I think having the non-static, multiple injects per tabletop example was neat. My tabletops often follow phases of the IR life cycle, whereas having the arbitrary injects move the plot could change that pace and add more dynamic content. It&#39;s also a little more realistic this way and mixes things up. I also really liked the emphasis on choosing and fitting the exercise to the audience. Such as having specific exercises target technical or non-technical audiences. The book also did well getting planners to estimate modes of participation, brainstorming how to generate more audience participation, and estimating some of the expected outcomes. I also think the postmortems on the exercise itself are a critical step and I&#39;m glad the text calls that out. It&#39;s important to extract the lessons learned into actionable tasks to be accomplished otherwise the exercise could be in vain (beyond the teamwork and educational opportunities from the exercise itself). The following is an random youtube video on how to run your own table top exercises if you are interested, it is generally unrelated to the book:&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/1XK_dZkb9Kw?si=20IqkVbqGHEUH7-H&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/8163569692260388670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/8163569692260388670' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8163569692260388670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/8163569692260388670'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/11/book-review-cybersecurity-tabletop.html' title='Book Review: &quot;Cybersecurity Tabletop Execercises&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvPsmOFb9P8o7sKwbNK2Bg0FehFfZWFUxOkYVWVbs_J3jc77-MmEmEjRfbZLJsWhfBqM3qBdoROxSNkZjAREfwuHeKlEScR3r3tjnuO__tMb9Rj9FBNVNOSkb4OtCmg5FPS8VF0D_rhXuUi1WJAtb-HF1NorftMsBTxthtghB3D0Xu3zreCloW5bY9rPO2/s72-w303-h400-c/tabletops.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-4126291409923878677</id><published>2025-11-14T14:00:00.000-08:00</published><updated>2025-11-18T11:51:23.680-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="coaching"/><category scheme="http://www.blogger.com/atom/ns#" term="communication"/><category scheme="http://www.blogger.com/atom/ns#" term="executive"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><title type='text'>Book Review: &quot;Conversational Intelligence&quot;</title><content type='html'>&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/s1000/convo_intel.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;966&quot; data-original-width=&quot;1000&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/w400-h386/convo_intel.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;Conversational Intelligence: How Great Leaders Build Trust and Get Extraordinary Results&quot; by Judith Glaser was a fairly decent book on building world class communication skills and thus interpersonal relationships. This was a fairly simple book that outlined how most corporate teams fail to communicate by issuing orders to one another and how to move toward conversations that view all parties as collaborators. I think the book is fairly thin in terms of actual stratagies to do this, and the author seemingly recreates a lot of existing theories and paradigms, without really referencing those existing structures.&amp;nbsp;This was a cheap and very reasonably priced book &lt;a href=&quot;https://www.amazon.com/Conversational-Intelligence-Leaders-Extraordinary-Results/dp/1629561436&quot;&gt;at $10 for 200 pages&lt;/a&gt;. And 
this was a mega quick read, I finished it easily under 6 hours.&amp;nbsp;&amp;nbsp;Overall I give this 5 out of 10 stars, as I think there are better ways to convey what the author is getting at. Overall I would probably recommend other leadership books unless you are specially suffering from bad communications skills and plagued by poor conversations. Don&#39;t get me wrong, I think there are good and important lessons here. Communicating at level three as she describes it, is critical I think to good interpersonal communication. But I also think the author makes up so many new terms, such as &quot;double clicking&quot; that it actually confuses their point when they could just describe the actual phenomenon more clearly. Further, &lt;a href=&quot;https://thorprojects.com/2017/06/26/book-review-conversational-intelligence-great-leaders-build-trust-get-extraordinary-results/&quot;&gt;other reviews have called out how the author seemingly bites&lt;/a&gt; other concepts without ever actually referencing the original materials. I got this vibe throughout the entire book and it was a really big turn off. For example she coins her own term and thus the title of the book as Conversational-Intelligence (C-IQ), as a play on the traditional Intelligence Quota (IQ) or the newer Emotional Intelligence (EQ). The problem is that her newly coined Conversational Intelligence is what most people have generally accepted as Emotional Intelligence (understanding others, their communication styles, and thus goals), yet I have never heard another use the phrase conversational intelligence in it&#39;s place, before this book. By redefining already accepted concepts to make them your own, without really adding anything new to the concepts you only serve to confuse the topic rather than clarify it.&amp;nbsp;The book is split into 3 parts, in my normal style here at the chapters of the book:&lt;/p&gt;&lt;p&gt;Introduction: Discovering a New Intelligence&lt;br /&gt;&lt;b&gt;Part I: Conversational Intelligence and Why We Need It&lt;br /&gt;&lt;/b&gt;Chapter 1: What We Can Learn from Our Worst Conversations&lt;br /&gt;Chapter 2: When We Lose Trust, We Lose Our Voice&lt;br /&gt;Chapter 3: Moving from Distrust to Trust&lt;br /&gt;&lt;b&gt;Part II: Raising Your Conversational Intelligence&lt;br /&gt;&lt;/b&gt;Chapter 4: Challenges of Navigating the Conversational Highway&lt;br /&gt;Chapter 5: Harvesting Conversational Intelligence Using the Wisdom of our Five Brains&lt;br /&gt;Chapter 6: Bringing Conversation to Life&lt;br /&gt;Chapter 7: Priming for Level III Conversations&lt;br /&gt;Chapter 8: Conversational Agility: Reframing, Refocusing, Redirecting&lt;br /&gt;Chapter 9: A Toolkit for Level III Conversations&lt;br /&gt;&lt;b&gt;Part III: Getting to the Next Level of Greatness&lt;br /&gt;&lt;/b&gt;Chapter 10: Leading with Trust: Laying the Foundation for Level III Interactions&lt;br /&gt;Chapter 11: Teaming Up Through Conversational Intelligence&lt;br /&gt;Chapter 12: Changing the Game Through Conversational Intelligence&lt;br /&gt;Epilogue: Creating Conversations That Change The World&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;As much as I think there are good, important lessons here around building trust and communication with your peers, many of the author&#39;s techniques in communicating how and why that is important, really rubbed me the wrong way. For example, the chapter on &quot;the five brains&quot; talks about fairly pseudo-science ideas that we have these oversimplified parts of our brain that evolved out of lizard brains. That combined with the advice that one must &quot;work on their third eye&quot; in order to improve conversations with people, just came off as hippie nonsense to me. The end notes and references are also extremely thin, mostly only referencing a few of &lt;a href=&quot;https://www.sciencefocus.com/the-human-body/the-lizard-brain-lie&quot;&gt;these weird debunked brain theories&lt;/a&gt;. Further, where she should be citing other works in the field and ideas she&#39;s borrowed, she uses multiple pages to thank CEOs who were her clients at various points in time. It feels very self-serving and like a weird shout-out as opposed to actual acknowledgments of other work in the field. Beyond that criticism, I think the book could have done more to describe different modes of 
communication that scale differently and thus lend themselves to 
different types of corporate &quot;conversations&quot;. The book is obviously pitched at improving work conversations, not all work conversations are equivalent, one on ones, or direct conversations. I would have liked to see more examples on what kind of &quot;conversation&quot; 
is an all-hands, and how can you open that up or best engage audiences 
at these levels of scale, not just in a single conversation or a small 
group setting. I think giving the readers more tools to have and improve these conversations could be genuinely really helpful in a book like this.&amp;nbsp;That said, the book is easy to read 
and includes dozens of simple graphs and graphics, or nice images that 
emphasize the points and break up the normal text. Feedback on this book is all across the board, but there are certainly some people that think similar to I on amazon reviews. That said, this is also a best seller and massively popular, so don&#39;t let me dissuade you, a lot of people really like it!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/4126291409923878677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/4126291409923878677' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4126291409923878677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/4126291409923878677'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/11/book-review-conversational-intelligence.html' title='Book Review: &quot;Conversational Intelligence&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPKBxpIQeBvhp9uA8PjVVTJbnhyVLP28qQxkWfNBjVafUWYaC0YMOTF1fLSZfhgOlW1uE2-FQPihX7esZnst5MLX_am33m5isZDm7eQM4N12hq4ihm3bV47qSWpCW_Xj-FZ_pTX-Elb2fVDxXf_CKLg-IuPHYWpz7AiO2ilCTKGMx3msMNjVPWMzaTjm21/s72-w400-h386-c/convo_intel.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6515709305450475984</id><published>2025-11-05T15:09:00.000-08:00</published><updated>2025-11-05T15:09:46.946-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="Marshall Goldsmith"/><category scheme="http://www.blogger.com/atom/ns#" term="WGYHWGYT"/><category scheme="http://www.blogger.com/atom/ns#" term="what got you here won&#39;t get you there"/><title type='text'>Book Review: &quot;What Got You Here, Won&#39;t Get You There&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/s500/WGYHWGYT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;500&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/w400-h400/WGYHWGYT.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;What Got You Here Won&#39;t Get You There: How Successful People Become Even More Successful&quot; by Marshall Goldsmith is a great book on evolving your leadership and management approach. It&#39;s a self help book that aims on personal improvement through various methods of corporate feedback. The book is straightforward, anecdotal, and practical. It focuses on first breaking down the ego and understanding that all of us, no matter how successful we are, can still find things to improve and work on in our life. The book really hammers home how success can get in our way, blinding us to our own shortcomings, or creating excuses for our behavior that is still holding us back, despite our own success. One of the really cool things about Marshall is that he publishes all of &lt;a href=&quot;https://www.marshallgoldsmith.com/blog&quot;&gt;his resources &lt;/a&gt;for free on his personal website, including &lt;a href=&quot;https://marshallgoldsmith.ai/chat&quot;&gt;a really neat LLM&lt;/a&gt; trained on his advice! I personally listened to the &lt;a href=&quot;https://www.amazon.com/What-Got-Here-Wont-There/dp/B000MGBNGW/&quot;&gt;book on audible&lt;/a&gt; for roughly ~8 hours (at 1.5 speed) for less than $1. I found it highly enlightening and generally good use of my time. Overall I give the book 6 out of 10 stars, as it didn&#39;t really say anything too novel or that I haven&#39;t heard before in terms of leadership coaching, however they are still critical lessons for any person, especially those who are already successful, to hear (again). I recommenced this book to anyone in a corporate setting, I firmly believe we all have features we can improve within ourselves and that recognizing that and setting up a plan for achieving it is within everyone&#39;s locus of control. In my typical style, here are the chapters of the book:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Section One: The Trouble with Success&lt;/b&gt;&lt;br /&gt;Chapter 1: You Are Here&lt;br /&gt;Chapter 2: Enough About You&lt;br /&gt;Chapter 3: The Success Delusion, or Why We Resist Change&lt;br /&gt;&lt;b&gt;Section Two: The Twenty Habits That Hold You Back from the Top&lt;/b&gt;&lt;br /&gt;Chapter 4: The Twenty Habits&lt;br /&gt;Chapter 5: The Twenty-First Habit: Goal Obsession&lt;br /&gt;&lt;b&gt;Section Three: How We Can Change for the Better&lt;/b&gt;&lt;br /&gt;Chapter 6: Feedback&lt;br /&gt;Chapter 7: Apologizing&lt;br /&gt;Chapter 8: Telling the World, or Advertising&lt;br /&gt;Chapter 9: Listening&amp;nbsp;&lt;br /&gt;Chapter 10: Thanking&lt;br /&gt;Chapter 11: Following Up&lt;br /&gt;Chapter 12:Practicing Feedforward&lt;br /&gt;&lt;b&gt;Section Four: Pull Out the Stops&lt;/b&gt;&lt;br /&gt;Chapter 13: Changing The Rules&lt;br /&gt;Chapter 14: Special Challenges for People in Charge&amp;nbsp;&lt;/p&gt;&lt;p&gt;Some of the major themes I want to highlight from the book are as follows. Successful people often fall into what Marshall calls &quot;success traps&quot;. What works early in a career (drive and competitiveness) becomes a liability at later levels or in different positions. Its important to not make excuses for our bad traits because we&#39;ve been successful despite them. Practice &quot;feedforward&quot;, not feedback. This is incredibly important when providing people input on their work. Don&#39;t diminish it or shoot it down by using negative language, rather focus on what to do next time or how to course correct going forward Perception is reality is a huge message. How others perceive your behavior defines your effectiveness as a leader, not how you perceive yourself. It&#39;s important to square your own assumptions with your external perception using peer feedback. Finally, interpersonal change is measurable. You can and should track progress in interpersonal behavior with regular check-ins and metric like systems, just as you would a technical program.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Marshall makes a point of listing out 20 bad habits that can doom a career, I&#39;de like to list them for readers below:&lt;/p&gt;&lt;p&gt;&amp;nbsp;1. Winning too much: The need to win at all costs and in all situations.&lt;br /&gt;&amp;nbsp;2. Adding too much value: The overwhelming desire to add our 2 cents to every discussion.&lt;br /&gt;&amp;nbsp;3. Passing judgment: The need to rate others and impose our standards on them.&lt;br /&gt;&amp;nbsp;4. Making destructive comments: The needless sarcasm and cutting remarks that we think make us witty.&lt;br /&gt;&amp;nbsp;5. Starting with NO, BUT, HOWEVER: The overuse of these negative words which&amp;nbsp; say to others that you’re wrong.&lt;br /&gt;&amp;nbsp;6. Telling the world how smart we are: The need to show people we’re smarter than they think we are.&lt;br /&gt;&amp;nbsp;7. Speaking when angry: Using emotional volatility as a management tool.&lt;br /&gt;&amp;nbsp;8. Negativity, or “that won’t work”: The need to share our negative thoughts even when we weren’t asked.&lt;br /&gt;&amp;nbsp;9. Withholding information: The refusal to share information in order to maintain an advantage over others.&lt;br /&gt;&amp;nbsp;10. Failing to give proper recognition: The inability to give praise and reward.&lt;br /&gt;&amp;nbsp;11. Claiming credit that that we don’t deserve: The most annoying way to overestimate our contribution to any success.&lt;br /&gt;&amp;nbsp;12. Making excuses: The need to reposition our annoying behavior as a permanent fixture so people excuse us for it.&lt;br /&gt;&amp;nbsp;13. Clinging to the past: To deflect blame away from ourselves and onto events and people from our past.&lt;br /&gt;&amp;nbsp;14. Playing favorites: Failing to see that we are treating someone unfairly.&lt;br /&gt;&amp;nbsp;15. Refusing to express regret: The inability to take responsibility for our actions.&lt;br /&gt;&amp;nbsp;16. Not listening: The most passive-aggressive form of disrespect for colleagues.&lt;br /&gt;&amp;nbsp;17. Failing to express gratitude: The most basic form of bad manners.&lt;br /&gt;&amp;nbsp;18. Punishing the messenger: The misguided need to attack the innocent who are informing us.&lt;br /&gt;&amp;nbsp;19. Passing the buck: The need to blame everyone but ourselves.&lt;br /&gt;&amp;nbsp;20. An excessive need to be “me”: Exalting our faults as virtues simply because they’re who we are.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Below you can see Marshall speaking at Google on some of the lessons in the book. It&#39;s an extremely interactive session with breaks in the middle where he asks the audience to engage in some exercises. You should skip around those parts as you watch at home:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/3WBeGAAYWg8?si=IF0kNX0_k1z7-V2D&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/6515709305450475984/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6515709305450475984' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6515709305450475984'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6515709305450475984'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/11/book-review-what-got-you-here-wont-get.html' title='Book Review: &quot;What Got You Here, Won&#39;t Get You There&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXTl36ZzP_cDIL9kPWV7uUbLFH_vK7OH3KVOc6XZCKZhgFMXTrCWSc1heqMX0v5C4YrivZBKc_0GAqMuH-um9wO8KSMJYO4i_3zReXTFqrczuTuRvGnl5H04HOmHbkpoIIGWgkA13888XjAF4KYzpEuU_SvUQBNH2fZHFagrXm1i6xl7OdOBml_fN53zaN/s72-w400-h400-c/WGYHWGYT.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-7199274196635692537</id><published>2025-10-25T13:58:00.000-07:00</published><updated>2025-10-25T13:58:36.854-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="andrew grove"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="high output management"/><category scheme="http://www.blogger.com/atom/ns#" term="leadership"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="team building"/><title type='text'>Book Review: &quot;High Output Management&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/s1000/high_output_management.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;648&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/w259-h400/high_output_management.jpg&quot; width=&quot;259&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;High Output Management&quot; by Andrew S Grove was a great book on various management strategies and lessons learned from Andy Grove scaling his career and business at Intel. The book is all about how managers can maximize their output, and thus the output of their team. It&#39;s all about where managers should be spending their time and what investments provide long term value in terms of company and employee growth. I think the book really resonated with me because there is such a focus on education and how a manager should really act as a guide and a teacher.&amp;nbsp;Overall I give this a 6 out of 10 book in my journey of learning better management and leadership strategies.&amp;nbsp; I recommend this book to those who still don&#39;t believe in the power of 1 on 1s or want help managing large teams across multiple organizations. I really like how the book talks about a manger&#39;s primary role being that of information flow and circulation, such that they are constantly communicating important task level information downward, project level information horizontally, and progress on goals upward. A large part of that communication is receiving information and understanding what the different aspects of the business are doing, to be able to translate it effectively to different audiences. There are several practical tools in this book that managers can implement immediately to become better at their jobs. In my typical format, here are the chapters in the book:&lt;/p&gt;&lt;p&gt;Introduction&lt;br /&gt;&lt;b&gt;Part I: The Breakfast Factory&lt;/b&gt;&lt;br /&gt;Chapter 1: The Basics of Production: Delivering a Breakfast&lt;br /&gt;Chapter 2: Managing the Breakfast Factory&lt;br /&gt;&lt;b&gt;Part II: Management Is a Team Game&lt;/b&gt;&lt;br /&gt;Chapter 3: Managerial Leverage&lt;br /&gt;Chapter 4: Meetings: The Medium of Managerial Work&lt;br /&gt;Chapter 5: Decisions, Decisions&lt;br /&gt;Chapter 6: Planning: Today&#39;s Actions for Tomorrow&#39;s Output&lt;br /&gt;&lt;b&gt;Part III: Team of Teams&lt;/b&gt;&lt;br /&gt;Chapter 7: The Breakfast Factory Goes National&lt;br /&gt;Chapter 8: Hybrid Organizations&lt;br /&gt;Chapter 9: Dual Reporting&lt;br /&gt;Chapter 10: Modes of Control&lt;br /&gt;&lt;b&gt;Part IV: The Players&lt;/b&gt;&lt;br /&gt;Chapter 11: The Sports Analogy&lt;br /&gt;Chapter 12: Task-Relevant Maturity&lt;br /&gt;Chapter 13: Performance Appraisal: Manager as Judge and Jury&lt;br /&gt;Chapter 14: Two Difficult Tasks&lt;br /&gt;Chapter 15: Compensation as Task-Relevant Feedback&lt;br /&gt;Chapter 16: Why Training Is the Boss&#39;s Job&lt;br /&gt;&lt;b&gt;One More Thing...&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;There are a few tools and themes that I found especially helpful from the book, such as tickler files, 1 on 1s, office hours, group decision making, matrix management, and task relevance maturity.&amp;nbsp;I really like the idea of using tickler files as reminder files or note files. I personally set mine up as google calendar dates, with either advanced notice or just as informational popups. I also like them when dealing with all of the intricacies of various team work and interpersonal issues. Especially coupled with 1 on 1s, to track and address employee issues, tickler files can be especially useful to establish early and maintain as a way of generating talking points, saving important notes, or just reaching out for something. I&#39;ve already talked about them in depth in other management book reviews, but 1 on 1s are a powerful tool for hearing employees as individuals, solving their direct problems, and providing valuable information about the job. Something new I got from this book was the idea of office hours to decrease short to medium-term interruptions by setting a dedicated time for them. The book also talks about career management and planning your career consciously, not only for yourself but helping your direct reports plan their career in their best interests. One really fascinating concept I got from this book around career growth, especially in terms of moving into management was the idea of &#39;task relevant maturity&#39;. This is the idea that someone may be a great manager in a subject they are very familiar with, but a poor manager in another area where they are less familiar. This is important to consider as your role grows and changes throughout your career. Lastly, I really like the idea of matrix management for large projects, or the idea that multiple people can oversee different parts of a team, and employees are beholden to multiple stakeholders or managers in delivering these large work streams. Other ways to accomplish this for specific projects are RACI charts, but the concept of matrix management alone is powerful for larger teams and organizations.&amp;nbsp;The following is a video series by Abi Tyas Tunggal on the book where he breaks the lessons from the book down into several short video lectures, it&#39;s really fantastic stuff:&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/xnjByFtiN7Q?si=Zy7R21Mw0ZxNmImE&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/7199274196635692537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/7199274196635692537' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7199274196635692537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/7199274196635692537'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/10/book-review-high-output-management.html' title='Book Review: &quot;High Output Management&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLclRrK2F_ohifBUpkjOfeF7a-zJfgI614L97hxQAkXmswQ8mvQzCu_2bWjItGk6JgCDbJ34KZe3xrmwQ4Jo5WCZkR_g54sPmaqbr4xN79VZBZHfo66dt_KPyMeSWsp0-1UPBqQLBI3AP7lMrEJp_Au2LgYpAhzRjhYTb6-A1ETMn6mWmYjkcAt3g1Erto/s72-w259-h400-c/high_output_management.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-5622509607366439541</id><published>2025-10-13T00:58:00.000-07:00</published><updated>2025-10-13T00:58:18.571-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blog Response"/><category scheme="http://www.blogger.com/atom/ns#" term="David Campbell"/><category scheme="http://www.blogger.com/atom/ns#" term="Dcam"/><category scheme="http://www.blogger.com/atom/ns#" term="Engineering Cliff"/><title type='text'>Bridging the Coming Engineering Cliff (Brainstorming Solutions for DCam&#39;s &quot;The Coming Engineering Cliff&quot;)</title><content type='html'>&lt;p&gt;David Campbell raises a valid concern: are we facing a looming engineering talent pipeline problem? His piece, &lt;a href=&quot;https://generativeai.pub/the-coming-engineering-cliff-5f961c432c56&quot;&gt;The Coming Engineering Cliff&lt;/a&gt;, paints a picture of AI rapidly encroaching on the territory of a proper computer science education. While the allure of AI-powered development is undeniable, we must not lose a critical element in the development of jr engineers: the irreplaceable value of hard-won experience, the kind forged in the fires of scaling nightmares and security incidents. This isn&#39;t about AI vs. engineers; it&#39;s about ensuring the next generation doesn&#39;t just trade depth for velocity while building skills.&lt;br /&gt;&lt;br /&gt;Campbell&#39;s argument hinges on AI&#39;s ability to automate and accelerate development. Fair enough. But engineering isn&#39;t just about churning out code; it&#39;s about understanding the underlying systems, anticipating failure modes, and crafting solutions that are both thoughtful and robust. This instinct isn&#39;t something you can simply train a LLM on. Instinct comes from going through a production outage at 3 AM, from tracing a memory leak through a million lines of code, from learning, often painfully, what not to do. It&#39;s about recognizing patterns not just statistically, but viscerally. It&#39;s the difference between knowing the rules of chess and being able to anticipate your opponent&#39;s strategy. In many ways it can be adversarial thinking, but applied to your own systems. LLMs excel at pattern matching. They can regurgitate solutions based on past incidents. But what happens when faced with a novel threat, a zero-day exploit, a scaling challenge no one has ever encountered before? That&#39;s where the A+ engineer, the one with the battle scars and the finely honed instincts, steps in. They don&#39;t just apply a prepackaged solution; they invent one that suits the need at hand.&lt;br /&gt;&lt;br /&gt;Cloud platforms and AI-powered tools promise to abstract away the complexities of infrastructure and security. And in many ways, they deliver. But this abstraction comes at a cost. Younger engineers, raised on these platforms, are increasingly shielded from the &#39;unforgiving edge of scale&#39;, as Campbell aptly puts it. They can deploy applications with a few clicks, without ever grappling with the intricacies of load balancing, network security, or database optimization, as examples. They become vibe coders, deploying code they barely understand, hoping for the best. This isn&#39;t to say these tools are inherently bad; they&#39;re incredibly powerful if used by engineers who possess a solid foundation of knowledge. The problem is that these platforms can become a crutch, preventing younger engineers from developing the deep understanding necessary to troubleshoot complex issues and design resilient systems. They&#39;re learning to drive without ever understanding how the engine works. And when the engine inevitably breaks down, they&#39;re left stranded.&lt;br /&gt;&lt;br /&gt;The core issue here is understanding why. A LLM trained on incident postmortems can identify potential failure points, but does it truly understand the underlying causes? Can it reason about nuanced trade-offs in a high-pressure situation? I&#39;m reminded of the Chinese Room argument: the AI can manipulate symbols according to rules, but it doesn&#39;t actually understand the meaning behind those symbols. This lack of understanding is particularly dangerous in security contexts. Trusting a non-deterministic black box that&#39;s prone to hallucinations to make critical security decisions is a recipe for disaster. We need engineers who can not only identify vulnerabilities but also understand the attacker&#39;s mindset, anticipate their moves, and design defenses that are both effective and adaptable. AI can augment human intelligence, but it can&#39;t replace it. We still need engineers who can think critically, creatively, and independently, who can challenge assumptions, and who can make informed decisions in the face of uncertainty.&lt;br /&gt;&lt;br /&gt;So, what&#39;s the solution? We can&#39;t simply abandon AI and cloud platforms; they&#39;re too valuable. Instead, we need to find ways to bridge the gap between abstraction and understanding, to cultivate the next generation of A+ engineers. Here are a few ideas:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Revive the apprenticeship model: Pair junior engineers with experienced mentors who can guide them through the complexities of real-world systems.&lt;/li&gt;&lt;li&gt;Create failure-friendly environments: Give engineers opportunities to experiment, to break things, and to learn from their mistakes in a safe and controlled setting. Think CTF environments where they must secure and scale vibe-coded programs.&lt;/li&gt;&lt;li&gt;Capture the wisdom of the elders: Document the experiences and insights of our most seasoned engineers before they retire or move on to other ventures. This means more senior engineers should blog or write about their hard gained experiences.&lt;/li&gt;&lt;li&gt;Integrate depth into the AI-assisted workflow: Design AI tools that not only automate tasks but also explain the underlying principles and trade-offs.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br /&gt;The goal isn&#39;t to eliminate AI, but to use it as a tool to enhance human intelligence, not to replace it. We need to create a culture that values depth of understanding, critical thinking, and the ability to adapt to unforeseen challenges. The coming engineering cliff isn&#39;t inevitable. But avoiding it requires a conscious effort to cultivate the next generation of A+ engineers, engineers who possess not only the technical skills but also the hard-won experience and the intuitive understanding necessary to navigate the complexities of the modern technological landscape. AI can be a powerful ally, but it&#39;s no substitute for human ingenuity. Let&#39;s not trade the wisdom of experience for the illusion of effortless automation. The future of engineering depends on it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/s1536/generative_work.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;1024&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/w426-h640/generative_work.png&quot; width=&quot;426&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/5622509607366439541/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/5622509607366439541' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5622509607366439541'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5622509607366439541'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/10/bridging-coming-engineering-cliff.html' title='Bridging the Coming Engineering Cliff (Brainstorming Solutions for DCam&#39;s &quot;The Coming Engineering Cliff&quot;)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiX75HFM9Optiw__3v1I9LqlUUmpHgQ2jbz78g1I7RlVwLKLBhrH7DrvFYEc-2yvp9VPPW8Ltwt3OsaqwINnhFH9hNWqmHNARgjDuWV0X5IYmdLNZffWDreBhowzYqO0mH3XdChZtQ0QYx1WSJ-YjNMRS3hdsuugpsJEOyLkfgxvll97WZqGAZaptMluiT/s72-w426-h640-c/generative_work.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-5324412422700474785</id><published>2025-08-31T10:29:00.000-07:00</published><updated>2025-08-31T11:26:37.579-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="Chinese Room Paradox"/><category scheme="http://www.blogger.com/atom/ns#" term="Justin Hutchens"/><category scheme="http://www.blogger.com/atom/ns#" term="Language of Deception"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="social engineering"/><title type='text'>Book Review: &quot;The Language of Deception&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/s1000/the_language_of_deception.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;668&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/w268-h400/the_language_of_deception.jpg&quot; width=&quot;268&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&quot;The Language of Deception: Weaponizing Next Generation AI&quot; By Justin Hutchens, takes an ambitious look at the intersection of social engineering, machine learning, and adversarial tradecraft. If you’re coming from a background in red teaming or threat intelligence, you’ll recognize many of the psychological and social principles, but what makes this book valuable is how it reframes those timeless tactics through the lens of AI for the general people. This book tries to warn people of the fallacy of the &quot;thinking machine&quot; or the idea that LLMs are intelligent or really considering ideas just because the output looks human. It&#39;s also a fantastic book on the history of AI, showing how these systems have evolved over time, and how models have been used throughout computer science. It&#39;s a long book around 400 pages, &lt;a href=&quot;https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/B0CRK5DQDR/ref=tmm_aud_swatch_0&quot;&gt;I listened to it on Audible&lt;/a&gt; at ~$15 for about 10.5 hours. I give it 6 out of 10 stars for being a great book on the risks of AI. Overall, I recommend the book to general technologists interested in AI as it lays out some stark realities with the tools, while not being too technical.&amp;nbsp;Although it was written in 2023, it feels like it was written awhile ago (because the space moves so fast) but still several of their predictions have come true. Hutchens doesn’t treat AI as magic. He systematically looks at how attackers could operationalize it, from mass-scale phishing to automated social-engineering campaign pretexting. The framing feels very much in line with how threat actors actually iterate on attack campaigns.&amp;nbsp;The following are the chapters of the book according to the Wiley website:&lt;br /&gt;&lt;br /&gt;Chapter 1: Artificial Social Intelligence&lt;br /&gt;Chapter 2: Social Engineering and Psychological Exploitation&lt;br /&gt;Chapter 3: A History of Technology and Social Engineering&lt;br /&gt;Chapter 4: A History of Language Modeling&amp;nbsp;&lt;br /&gt;Chapter 5: Consciousness, Sentience, and Understanding&lt;br /&gt;Chapter 6: The Imitation Game&lt;br /&gt;Chapter 7: Weaponizing Social Intelligence&lt;br /&gt;Chapter 8: Weaponizing Technical Intelligence&lt;br /&gt;Chapter 9: Multimodal Manipulation&lt;br /&gt;Chapter 10: The Future&lt;br /&gt;Chapter 11: The Quest for Resolution&lt;/p&gt;&lt;p&gt;Some parts feel a little disconnected from the reality of the technologies. For example around Chapter 7 the author is talking about bot automation and automated service interaction and discuses using the UI and web scraping to avoid bot detection, when in reality these techniques are pretty different from simply using the or scraping the user UI, and such actives are heavily logged and scrutinized for bot activity. I know it&#39;s a small nitpick but it shows a strange disconnect from the reality of some of the techniques. It&#39;s also a little wonky because the audio book counts the chapters differently than the print book, but I&#39;ve referenced the print chapters here. The book calls out one of the major threats my team repeatedly calls 
out, which is the illusion of intelligence in modern LLMs. Just because 
some it putting together a string of words that gives the illusion that 
it understands, doesn&#39;t mean the model has a true understanding of the 
content. This can cause users of these systems to place a false 
confidence in their output or misunderstand the tools entirely. Hutchens brilliantly demonstrates this with the &quot;&lt;a href=&quot;https://philosophyterms.com/chinese-room-paradox/&quot;&gt;Chinese Room Paradox&lt;/a&gt;&quot;, reminding us that convincing language isn’t evidence of comprehension. The following is an interview with Hutchens discussing the contents of the book:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/odf8RnQXgTU?si=vutVHcAdE5CpWxIr&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/5324412422700474785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/5324412422700474785' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5324412422700474785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/5324412422700474785'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/08/book-review-language-of-deception.html' title='Book Review: &quot;The Language of Deception&quot;'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0M9rGZ2pEtw8xe4k1crGipsU8-CFyh0Mpms9mKrYUw7wgS8yFyqHWO5rmJp1C4MUsJ4lAJZpu5VKET1bERzCIJUXJiVcA9HmbpJ97Ijm1WzbSHU4lfGaTfAj4VcAKzvDCxj4XXjvcstykeDfnXMhjIQC8nVr7BkfMGVUMrNV-9j7pKq9pgtg5ihBL0jnf/s72-w268-h400-c/the_language_of_deception.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8360026754900740261.post-6174015134380788811</id><published>2025-08-27T17:34:00.000-07:00</published><updated>2025-09-08T00:12:08.344-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="def con"/><category scheme="http://www.blogger.com/atom/ns#" term="experience"/><category scheme="http://www.blogger.com/atom/ns#" term="GOON"/><category scheme="http://www.blogger.com/atom/ns#" term="volunteering"/><title type='text'>I Tried Gooning at DEF CON (Do Not)</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s376/defcon_police.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;376&quot; data-original-width=&quot;376&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s320/defcon_police.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;I recently volunteered as a DEF CON goon expecting to help people feel welcome and connected. Instead, I was let go for a minor infraction, an experience that left me concerned about how the culture of volunteering at DEF CON has shifted.&amp;nbsp;When volunteers give their time and money, they should be empowered to support attendees, not treated like replaceable enforcers. DEF CON thrives on community, but that only works if volunteering stays rooted in connection, not control. I don&#39;t want to name any specific people or leaders involved in this decision process, but as a long term volunteer for security events this just felt over the top to me. I will name the group, as this happened while I was volunteering for the NFO section of the goons (info goons), but to be frank I thought they would be the most open and least &quot;GOON&quot;-like group. The official reason I was let go was that I missed a call from my shift lead and was absent from a newly created shift location for 45 minutes. I thought I was activly doing my job by showing people the rooms, as I was engaged in helping DEF CON attendees find locations and people they were interested in the entire time. At the end of the day I&#39;m volunteering to make a more positive experience for others attending the thing. And I didn&#39;t do anything offensive or against the rules, I was just temporarily outside the control of a manager, and that was a terminal event. On top of that, I&#39;m a highly educated person who is often in leadership and managerial positions, so I understand feedback and coarse correction if I&#39;m not doing my job right. Firing me for being absent (due to a misinterpretation of what I thought I was supposed to be doing), is so absurd within a volunteer context that it really attributes itself to the over-zealous image of goons that the community has formed. Here are my major issues with the current culture of DEF CON goons:&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p data-end=&quot;1042&quot; data-start=&quot;835&quot;&gt;&lt;strong data-end=&quot;862&quot; data-start=&quot;835&quot;&gt;Authority &amp;amp; Power Trips&lt;/strong&gt;&amp;nbsp;- Certain goons come across like “mall cops,” more interested in enforcing rules than helping people. Some even brag about skipping lines or using their role for personal perks.&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1068&quot; data-start=&quot;1045&quot;&gt;Clique-ish Dynamics&lt;/strong&gt;&amp;nbsp;- It can feel like an insider’s club where newcomers aren’t welcomed. First-time volunteers often struggle to connect, while long-timers stick together.&lt;strong data-end=&quot;1249&quot; data-start=&quot;1226&quot;&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1249&quot; data-start=&quot;1226&quot;&gt;Status Over Service&lt;/strong&gt;&amp;nbsp;- The role can seem like a badge of superiority rather than a commitment to supporting attendees.&lt;/p&gt;&lt;p&gt;&lt;strong data-end=&quot;1373&quot; data-start=&quot;1352&quot;&gt;Unapproachable&lt;/strong&gt;&amp;nbsp;- Groups of info goons often cluster together, making them intimidating and generally ineffective (They don&#39;t all answer questions when grouped like that, most of them stand around doing nothing). Attendees also report that simple questions often go unanswered&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Rules Over Hospitality&lt;/strong&gt;&amp;nbsp;- Instead of focusing on helping people, there’s a strong emphasis on enforcing arbitrary rules, which creates the impression that attendees are being policed rather than supported.&lt;/p&gt;Some perceive that goons enjoy status more than service, treating their role as a badge of superiority. I was very excited and eager to help people, but it felt like my shift lead was more eager to correct me or chastise me (For example I stopped in the hallway to give someone stickers, less than a minute activity, and I was chastised and told we had a five minute rule so I shouldn&#39;t be stopping and giving out things). Ultimately, I volunteered because I wanted to connect with people and make their DEF CON a more enriching experience. Being dismissed for trying to do that but not meeting some arbitrary rule left me questioning whether the culture around DEF CON goons has lost sight of its original and intended purpose. For further context on how DEF CON’s culture is shifting more broadly, this piece is worth a read:&amp;nbsp;&lt;a class=&quot;decorated-link&quot; data-end=&quot;2502&quot; data-start=&quot;2391&quot; href=&quot;https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;When Counterculture and Empire Merge&lt;/a&gt;&lt;a class=&quot;decorated-link&quot; data-end=&quot;2502&quot; data-start=&quot;2391&quot; href=&quot;https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge?utm_source=chatgpt.com&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;ms-0.5 inline-block align-middle leading-none&quot;&gt;&lt;svg class=&quot;block h-[0.75em] w-[0.75em] stroke-current stroke-[0.75]&quot; data-rtl-flip=&quot;&quot; fill=&quot;currentColor&quot; height=&quot;20&quot; viewbox=&quot;0 0 20 20&quot; width=&quot;20&quot; xmlns=&quot;http://www.w3.org/2000/svg&quot;&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.lockboxx.org/feeds/6174015134380788811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8360026754900740261/6174015134380788811' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6174015134380788811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8360026754900740261/posts/default/6174015134380788811'/><link rel='alternate' type='text/html' href='http://blog.lockboxx.org/2025/09/i-tried-gooning-at-def-con-do-not.html' title='I Tried Gooning at DEF CON (Do Not)'/><author><name>Action Dan</name><uri>http://www.blogger.com/profile/03256845855236832503</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn5vus1pjc1cHcfKh61mfAbwbNL9xmsWDU2O9ehiFsDdESWeLUkDfsIxpzD183JHWWCpPP6Ckca04lEjTC4GUzLcPa1uDw8WBQqcXwn2eDHSXxfGlzXQdi7XIWEL2Flvpdv0OeYzRpyDrvFVYzD3PiLr_46SerWnZ7z3S73w5e8P3xGlxKnptJDNPXlOQI/s72-c/defcon_police.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>