eBPF, Sockets, Hop Distance and manually writing eBPF assembly

A friend gave me an interesting task: extract IP TTL values from TCP connections established by a userspace program. This seemingly simple task quickly exploded into an epic Linux system programming hack. The result code is grossly over engineered, but boy, did we learn plenty…

2018 Cybersecurity Report Spotlights Emerging Threats to OT Environments

Manufacturers saw many interesting developments in the realm of industrial security in 2017. There were tremendous shifts in how to guard against threats with ransomware like WannaCry,… VISIT THE SOURCE ARTICLE 2018 Cybersecurity Report Spotlights Emerging Threats to OT Environments

Writing complex macros in Rust: Reverse Polish Notation

(This is a crosspost of a tutorial originally published on my personal blog) Among other interesting features, Rust has a powerful macro system. Unfortunately, even after reading The Book and various tutorials, when it came to trying to implement a macro which involved processing complex…

Multiple hackers have pleaded guilty and confessed to attacking America under orders from Russia

There have been many interesting public revelations domestically in the Mueller investigation lately from the the fact that the Trump campaign was specifically warned during their security briefings that foreign elements may attempt to contact and gain influence over them while in fact George Papadopoulos, Michael Flynn, Carter…