Blog

Leveraging Artificial Intelligence and Automation for Enhanced Capability in Cybersecurity

I've recently been interested in Artificial Intelligence technologies and how they could be used to improve the cybersecurity capabilities for both individuals and organizations. This prompted me to build PhishText.Ai, which I showcased in my previous blog post. I wanted to expand on this topic and write down some broader thoughts I've had, while brainstorming … Continue reading Leveraging Artificial Intelligence and Automation for Enhanced Capability in Cybersecurity

Exploring The Integration of Artificial Intelligence and Cybersecurity with PhishText.Ai

It's no secret that Artificial Intelligence and Large Language Models are dominating the technology industry in 2023. After years of speculation and predictions, ChatGPT burst onto the scene in November last year and quickly became an overnight sensation. This explosion in AI adoption and the seemingly endless possibilities inspired me to start building programs that … Continue reading Exploring The Integration of Artificial Intelligence and Cybersecurity with PhishText.Ai

Burp Suite Certified Practitioner (BSCP) Review and Tips

Over the past few months, I've been honing my web application testing skills by studying Portswigger Labs and Academy content. Recently, I decided to pursue Portswigger's relatively new Burp Suite Certified Practitioner (BSCP) certification. Although Portswigger and Burp Suite have long been staples of the web application testing industry, the certification exam was only launched … Continue reading Burp Suite Certified Practitioner (BSCP) Review and Tips

Preparing for and Delivering My First Conference Talks

In July last year, I took a big step outside of my comfort zone and delivered two talks at local New Zealand cyber security conferences. These talks were a big highlight of my 2022, and I haven’t had the chance to fully reflect on my experience preparing for and delivering the talks. While we're still … Continue reading Preparing for and Delivering My First Conference Talks

Finding and Disclosing My First CVE’s

CVE’s, short for Common Vulnerabilities and Exposures, are a reference model for publicly known security vulnerabilities. Whenever a vulnerability is identified and disclosed, a new CVE can be requested and issued to document this vulnerability. Over time, as countless vulnerabilities have been discovered and documented, CVE’s have become the de facto method to classify vulnerabilities … Continue reading Finding and Disclosing My First CVE’s

Pivoting Through Internal Networks with Sshuttle and Ligolo-ng

"Pivoting" is the method used to navigate throughout a network, by using a compromised "foothold" host to gain access to other internal networks and network components that otherwise wouldn't have been accessible directly. In most networks, there will be various network segments that will contain different servers or devices of interest. It is therefore an … Continue reading Pivoting Through Internal Networks with Sshuttle and Ligolo-ng

CVE-2021-40444 PoC Demonstration

Introduction This week, a new zero-day vulnerability was disclosed affecting Microsoft Office applications. CVE-2021-40444 made waves throughout the cybersecurity industry for its ability to perform remote code execution on Windows operating systems with minimal interaction from the user. By simply opening a specially crafted Microsoft Office document, remote code execution could be obtained. Within a … Continue reading CVE-2021-40444 PoC Demonstration

Spoofing an Android Phone to Exploit the Razer Local Privilege Escalation Vulnerability

Intro Last Sunday, on a particularly lazy afternoon, I came across a Tweet that caught my attention. It was a demonstration of a local privilege escalation vulnerability that is possible when plugging in a Razer device to any Windows machine. The TL;DR of this vulnerability is that Windows identifies the drivers and software required for … Continue reading Spoofing an Android Phone to Exploit the Razer Local Privilege Escalation Vulnerability