Kyle BjoinDefending Against Shell Profile AttacksA few months ago I wrote on the subject of using the shell configuration files to launch malicious code. After writing that up I started…Mar 26, 2021Mar 26, 2021
Kyle BjoinPrivilege Escalation leveraging shell profilesThe title may not sound like it but I promise, I’m not on the Red Team. However, as a systems administrator I do think that poking around…Aug 12, 2020Aug 12, 2020
Kyle BjoinA Look into Securing SSH IdentitiesWorking in IT and Security has given me so many opportunities to dive into a subject and really try to understand not only what the best…Aug 6, 2020Aug 6, 2020