Security Not Included

DEFCON Convention - DEF CON Black Badge - Front

DEFCON Convention – Black Badges, CTFs, and VEGAS!

While I know this may not be the preferred spelling, I want to repurpose ALL of my old DEFCON convention posts, so here we go! Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into …

DEFCON Convention – Black Badges, CTFs, and VEGAS! Read More »

BSidesRDU 2019 - Bookshelf

Best Hacker Conference in the Area? BSidesRDU!

I wanted to update and combine some of my hacker conference posts, so BSidesRDU made for a great first run at it! Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing …

Best Hacker Conference in the Area? BSidesRDU! Read More »

2019 Review - Views

Hacking Blog Aspirations – My Progress Through the Years

It was time for me to combine all of my hacking blog updates and statues, so that I’d have one living post! Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing …

Hacking Blog Aspirations – My Progress Through the Years Read More »

Two Factor Authentication - Frustrating hackers

What is Two Factor Authentication (2FA)? AVOID Getting Hacked!

Today I want to cover what exactly multi factor authentication or two factor authentication is, what any abbreviations (like MFA or 2FA) are, and how you SHOULD be using it to protect yourself! Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines …

What is Two Factor Authentication (2FA)? AVOID Getting Hacked! Read More »

VulnHub InfoSec Prep OSCP - WordPress home page

VulnHub InfoSec Prep OSCP Walkthrough – Stealing SSH Keys

I know that these posts are slightly repetitive, but I also solved VulnHub InfoSec Prep OSCP during my streaming! Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; …

VulnHub InfoSec Prep OSCP Walkthrough – Stealing SSH Keys Read More »

QR code

VulnHub Relevant Walkthrough – More WordPress Exploitation

The next machine that I solved was VulnHub Relevant, and it was another good one. Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. …

VulnHub Relevant Walkthrough – More WordPress Exploitation Read More »

VulnHub Investigator Walkthrough - AppLocker PIN code unlock

VulnHub Investigator Walkthrough – Phone Hacking?

This time, my VulnHub Investigator Walkthrough is for hacking into an actual Android device. Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. To …

VulnHub Investigator Walkthrough – Phone Hacking? Read More »

PowerLessShell - Fixed encoded CSPROJ variable

PowerLessShell + MaliciousMacroMSBuild = Shells

While I haven’t used it recently, I wanted to share my brief walkthrough of using PowerLessShell with MaliciousMacroMSBuild. Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s …

PowerLessShell + MaliciousMacroMSBuild = Shells Read More »

Web application home

VulnHub CyberSploit 2 Walkthrough – Docker Privilege Escalation

Continuing with the current theme, I’m excited to share my VulnHub CyberSploit 2 walkthrough. Ray DoyleRay Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. To …

VulnHub CyberSploit 2 Walkthrough – Docker Privilege Escalation Read More »