I Hate Amazon

FYI, this post is more of a rant than anything else so feel free not to read it.  Many of you probably don’t know but I have a 10 year old daughter and a 6 year old son.  A few years ago for Christmas we bought them both these Kindle kids editions.  The thing is really just a normal kindle, but it comes with a plastic protector around it (which is actually pretty damn beefy) and more importantly, it comes preconfigured with their “Freetime” application that basically sandboxes the kids account and greatly limits what they can do and get to.  It also comes with free content like a number of applications as well as age appropriate books, etc.

Signal Chief Is Legit Now!

Signal Chief in SLC

A couple of months ago I got an email from the training developer for the 25W SLC course asking if it would be possible for them to use some of the articles that I’ve posted here as a daily handout to be used for a short 15 minute discussion.

Happy Birth(day) CYBERCOM

Today marked several historic events for the Department of Defense.  In the course of a couple of hours, three big events happened. 

Boss of the SOC


Back in November I had the chance to attend the Splunk .conf conference here in DC.  One of the big after hours events of the conference is the Boss of the SOC (BOTS) competition that puts teams against each other to try and analyze a set of data to identify a variety of indicators of compromise from an incident. After a little bit of talking, Splunk decided to release the BOTS app as an open-source project.


TACLANE Encrypted Tunnel

Here is another CTF problem from last years Army Cyber Stakes Challenge.  You are provided a solid line of characters (see below) and have to turn it into the flag.  The trick is that because there aren’t any line breaks, you have to figure it out.


SNMP Packets

Another problem from ACSC5. You’ve been able to get on a router and capture some traffic in an effort to map out the the corporate network. Your intelligence team has told you that your target device has an IP address of but no one knows that actual location of it. Examine the network traffic and see if you can figure out the location of that device.