Welcome to In Depth Defense. In Depth Defense LLC is a privately owned Information Security Consulting company owned and operated by Mark Baggett. In Depth Defense specializes in Penetration Testing and Incident Response. At this time In Depth Defense is not accepting any new client work, but we are happy to speak to you and point you to other resources in the community.

Mark Baggett has been active in Information Security for 18+ years. I've served in a variety of roles from software developer to CISO. You can find archives of older blog entries below and read my newer posts on http://www.pauldotcom.com, http://isc.sans.edu and http://pen-testing.sans.org








Wednesday, December 10, 2014

Security Weekly Posts moved from Pauldotcom.com

You probably are aware that Pauldotcom is now Security weekly.   They guys were kind enough to move all the old posts I did for them to their new website.   Here is a list of links to articles by me on the new Security Weekly Website.

http://securityweekly.com/2011/11/2/incremental-zone-transfers-for/
http://securityweekly.com/2011/10/23/python-one-line-shell-code/
http://securityweekly.com/2010/3/16/nessus-scanning-through-a-meta/
http://securityweekly.com/2010/3/3/ssh-gymnastics-with-proxychain/
http://securityweekly.com/2012/10/15/volume-shadow-copies-the-los/
http://securityweekly.com/2010/4/25/using-meterpreter-to-control-n/
http://securityweekly.com/2010/4/10/capturing-ssh-v1-v2-credential/
http://securityweekly.com/2010/3/30/resilient-ssh-tunneled-meterpr/
http://securityweekly.com/2010/10/12/windows-7-symbolic-links-and-h/
http://securityweekly.com/2013/2/24/file-hiding-and-process-obfusc/ 
http://securityweekly.com/2011/12/5/looking-for-stealth-ads-stream/
http://securityweekly.com/2010/1/29/draft-heres-what-you-missed/
http://securityweekly.com/2010/1/31/csaw-challenge-reflections-o/
http://securityweekly.com/2010/1/10/gone-in-60-seconds/
http://securityweekly.com/2010/2/23/killing-the-monkey-in-the-midd/
http://securityweekly.com/2010/4/12/exploring-the-facebook-api/
http://securityweekly.com/2009/11/30/the-quest-for-a-shmoocon-barco/
http://securityweekly.com/2009/8/12/tcp-frament-evasion-attacks/
http://securityweekly.com/2010/9/13/web-penetration-testing-script-1/
http://securityweekly.com/2010/9/21/web-application-penetration-te/
http://securityweekly.com/2010/10/9/real-time-google-hacking/
http://securityweekly.com/2010/2/20/bypassing-av-with-msfencode-x/
http://securityweekly.com/2010/2/19/smashing-the-general-ledger-fo/
http://securityweekly.com/2012/7/18/post-exploitation-recon-with-e/
http://securityweekly.com/2010/2/15/deleting-the-undeleteable/
http://securityweekly.com/2010/2/22/running-a-command-on-every-mac/
http://securityweekly.com/2011/5/1/new-idle-scan-sees-through-you/
http://securityweekly.com/2011/8/15/how-a-week-old-privilege-escal/
http://securityweekly.com/2010/10/15/tsharkwireshark-ssl-decryption/
http://securityweekly.com/2010/2/23/meterpreter-script-to-unlock-t/
http://securityweekly.com/2009/12/18/why-your-metasploit-psexec-mod/
http://securityweekly.com/2010/8/14/draft-creating-per-user-cust/
http://securityweekly.com/2009/8/19/rnicrosoftnet-is-back-up/
http://securityweekly.com/2009/11/20/authentication-bypass-in-gina/
http://securityweekly.com/2010/9/27/web-application-penetration-te-1/
http://securityweekly.com/2010/9/7/web-penetration-testing-script/
http://securityweekly.com/2009/7/16/draft-not-ready-quick-and-e/
http://securityweekly.com/2011/8/30/evil-core/
http://securityweekly.com/2011/4/21/eap-md5-offline-password-attac/

No comments:

Subscribe