Brett Lischalk
  • Lets Build A CI Pipeline Threat Model

    Lets build a threat model of a CI pipeline for fun

    April 24, 2021 - 7 minute read -
    threat modeling CI Pipeline container registry
  • Switching to Windows Part 1

    Taking the plunge on a Windows based laptop after years using OS X and Linux based devices

    April 5, 2021 - 5 minute read -
    windows linux mac wsl virtualization docker
  • Build A Web Site/App Quick and Cheap!

    Cheapest and fastest ways to get your project online

    December 19, 2020 - 5 minute read -
    thrifty cheap fast webapp php ruby static site generator gitlab github
  • Amazon ECR Image Scanning Gotchas

    Things you should know about the "vulnerabilities" ECR image scan results report

    December 1, 2020 - 3 minute read -
    docker aws ecr clair vulnerabilities compliance scanning
  • Practical Malware Analysis: Lab 3-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-3 malware.

    June 27, 2018 - 2 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-2 malware.

    December 31, 2017 - 5 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-1 malware.

    September 20, 2017 - 5 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Network Decryption

    In the first blog post about the Kankun smartplug, the Android application was decompiled and the AES-256 bit encryption key was found. In this blog post, the network traffic between the mobile app and smartphone will be captured, the network traffic will be decrypted utilizing a script from Payatu and the encryption key found previously, and the Kankun Smartplug will be controlled via the Kankun Controller Script from 0x00string

    September 15, 2017 - 9 minute read -
    analysis kankun decryption
  • Practical Malware Analysis: Lab 1-4

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-4 malware.

    August 28, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-3 malware.

    August 27, 2017 - 3 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-2 malware.

    August 24, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-1 malware.

    August 24, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Analysis

    During the Offensive Internet Of Things course, the Kankun Smart Plug is analyzed in various ways including: using Jadx to decompile and analyze the mobile app, acquiring and analyzing the device's firmware, and a nalyzing the network traffic.

    August 14, 2017 - 6 minute read -
    firmware analysis kankun android
  • Asus RT-N15U Firmware Analysis

    For the next firmware analysis task of the Offensive Internet Of Things Exploitation final project, I decided to analyze the Asus RT-N15U firmware version 3.0.0.4.376.3754. The following is the process I used to backdoor, emulate, and analyze this firmware as well as any security issues I could find.

    July 20, 2017 - 9 minute read -
    firmware asus reverse-engineering
  • TP-Link TL-WR810N Firmware Analysis

    For one of the projects for the Offensive Internet Of Things Exploitation final exam I decided to try to analyze the firmware for the TP-Link TL-WR810N

    July 5, 2017 - 7 minute read -
    firmware analysis tp-link
  • Nand Glitching Wink Hub For Root

    During the Offensive Internet Of Things Exploitation course the instructor demonstrates a technique called a "NAND Glitch" on a Wink Connected Home Hub IoT device. This technique allows a root shell to be acquired on a device which normally does not provide console access. This post outlines the process I used to replicate the NAND Glitch as well as discusses some of the "gotchas" that I encountered along the way.

    July 5, 2017 - 6 minute read -
    nand-glitch wink-hub root uart
  • Mounting Virtualbox Shared Folder in Manjaro Guest

    Everytime I setup a Linux vm in Virtualbox and attempt to get shared folders working, I always run into issues. I decided to create a blog post to save my self the trouble of Googling so that I have the information in one place. In the various distros I have encountered issues with, Manjaro being the most recent, the issues have seemed to have been addressed by three things.

    May 11, 2017 - 2 minute read -
    manjaro virtualbox
  • Haskell YAML Config

    A quick example of reading a yaml config file in Haskell.

    February 5, 2017 - 3 minute read -
    haskell yaml config
  • Haskell TCP Fuzzer

    An example TCP fuzzer written in Haskell

    February 5, 2017 - 5 minute read -
    haskell fuzzer
  • Linux Daemon

    How to write a Linux daemon.

    January 17, 2017 - 6 minute read -
    c daemon linux
  • Opcode Script

    Opcodes from Assembly Instructions

    January 15, 2017 - 1 minute read -
    asm opcodes
  • SLAE Problem 7: Create a Custom Crypter

    SLAE Problem 7: Create a Custom Crypter

    January 10, 2017 - 10 minute read -
    asm shellcode crypter
  • SLAE Problem 6: Shell-Storm.com Shellcode Analysis and Polymorphic Modification

    SLAE Problem 6: Shell-Storm.com Shellcode Analysis and Polymorphic Modification

    January 9, 2017 - 17 minute read -
    asm shellcode polymorphic
  • SLAE Problem 5.3: Msfvenom Analysis of linux/x86/exec

    Analysis of Msfvenom shellcode: linux/x86/exec

    January 3, 2017 - 5 minute read -
    asm shellcode msfvenom
  • SLAE Problem 5.2: Msfvenom Analysis of linux/x86/adduser

    Analysis of Msfvenom shellcode: linux/x86/adduser

    January 3, 2017 - 6 minute read -
    asm shellcode msfvenom
  • Older posts
Tweets by @blischalk

Site content by: Brett Lischalk.