Gr@ve_RoseCUPS VulnerabilityRecently, evilsocket released a document about remotely exploiting the CUPS service with root privileges. I’m going to take this…Sep 27Sep 27
Gr@ve_RoseOPSEC FailureBack on August 18th, 2023, I went to Starbucks with a friend of mine to grab a drink. Little did I know that this innocent trip would lead…Apr 21, 2023Apr 21, 2023
Gr@ve_RoseMifare 1K ClassicI’ve recently started delving back into RFID attacks since a lot of businesses will likely be asking for physical PenTests or, at the…Nov 26, 2021Nov 26, 2021
Gr@ve_RoseTunnelling Core Impact Through Cobalt StrikeI keep saying that my mission is to turn hackers into networkers and networkers into hackers. Having an understanding is great but having…Apr 29, 2021Apr 29, 2021
Gr@ve_RoseRabbit HolesAs a hacker, we often go down rabbit holes of information when doing our thing. This could be trying to fully understand a protocol…Mar 17, 2021Mar 17, 2021
Gr@ve_RoseI Was Blocked or Why 280 Characters Isn’t Enough SometimesI’m usually pretty cool as a cucumber. I’ve learned that I don’t really give a shit about what people think of me. But this one… This one…Mar 17, 2021Mar 17, 2021
Gr@ve_RoseHow I Got Into *SecEveryone has their own path and I’m not here to tell you my path is the right way or admonish anyone for choosing the path they take. I am…Feb 19, 2021Feb 19, 2021
Gr@ve_RoseLet’s Go PhishingOne request we get from clients often enough is a phishing campaign request to test their users on this form of Social Engineering. You…Feb 19, 2021Feb 19, 2021
Gr@ve_RoseMoonlander Keyboard ReviewI recently got my Zsa Moonlander keyboard (https://www.zsa.io/moonlander/) to replace my aging Truly Ergonomic Computer Keyboard (TECK —…Dec 4, 2020Dec 4, 2020
Gr@ve_RoseTwo Systran Vulnerabilities and their ExploitsThese are my first two independently discovered vulnerabilities which I’ve requested CVEs for (and will update the article if/when I get…Dec 3, 2020Dec 3, 2020