<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Eric's Blog</title><link>https://blog.ericturner.it/</link><description/><atom:link href="https://blog.ericturner.it/feeds/all.rss.xml" rel="self"/><lastBuildDate>Sun, 17 May 2026 20:36:00 -0400</lastBuildDate><item><title>New Blog 2026</title><link>https://blog.ericturner.it/2026/05/17/new-blog-2026/</link><description>&lt;p&gt;This marks the debut of my redesigned blog. My prior blog was ran on Wordpress with multiple plugins for enhancing security: filtering spam, blocking malicious admin logins, filtering malicious comments, backup jobs, auto-update jobs, analytics, asynchronous password protection. Unfortunately with AI, search crawlers and legitimate users, it kept hitting the …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sun, 17 May 2026 20:36:00 -0400</pubDate><guid>tag:blog.ericturner.it,2026-05-17:/2026/05/17/new-blog-2026/</guid><category>Announcements</category></item><item><title>Continuous Threat Exposure Management</title><link>https://blog.ericturner.it/2025/06/22/continuous-threat-exposure-management/</link><description>&lt;p&gt;I recently &lt;a href="https://www.credly.com/badges/1bccd16f-90cb-4010-847f-d91111b7548e/public_url"&gt;earned a certificate&lt;/a&gt; in exposure management and here&amp;rsquo;s some of the key takeaways. Cyber teams now have a broad attack surface with assets ranging from on-prem to IoT and cloud solutions. Traditional vulnerability management simply can&amp;rsquo;t keep up. That&amp;rsquo;s where exposure management steps in: it …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sun, 22 Jun 2025 21:01:00 -0400</pubDate><guid>tag:blog.ericturner.it,2025-06-22:/2025/06/22/continuous-threat-exposure-management/</guid><category>Cybersecurity</category><category>exposure-management</category></item><item><title>Web Dev - RSS Reader App - 02</title><link>https://blog.ericturner.it/2025/03/29/web-dev-rss-reader-app-02/</link><description>&lt;p&gt;GitHub:&amp;nbsp;&lt;a href="https://github.com/EricTurner3/simple-react-rss-reader"&gt;EricTurner3/simple-react-rss-reader&lt;/a&gt; &lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2025/03/image-13.webp"/&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2025/03/image-10.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Drag and drop UI&lt;/p&gt;
&lt;p&gt;I recently stumbled upon &lt;a href="https://www.cursor.com/"&gt;Cursor - The AI Code Editor&lt;/a&gt;. It essentially is VS Code powered by Claude for GPT enhancements. The unique thing about this AI is taht it has your entire multi-file codebase as context and can easily search and modify the …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 29 Mar 2025 21:45:22 -0400</pubDate><guid>tag:blog.ericturner.it,2025-03-29:/2025/03/29/web-dev-rss-reader-app-02/</guid><category>Web Development</category><category>generative-ai</category><category>nodejs</category><category>react</category><category>rss-reader-app</category></item><item><title>Web Dev - RSS Reader App - 01</title><link>https://blog.ericturner.it/2025/03/20/web-dev-rss-reader-app-01/</link><description>&lt;p&gt;GitHub: &lt;a href="https://github.com/EricTurner3/simple-react-rss-reader"&gt;EricTurner3/simple-react-rss-reader&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2025/03/front_end_20Mar2025.webp"/&gt;&lt;/p&gt;
&lt;p&gt;I have a few goals with this project that I've already spent several hours on over the past few nights.&lt;/p&gt;
&lt;h2 id="1-testing-out-ai-based-tools-for-code-generation-and-guidance"&gt;1. Testing out AI based tools for code generation and guidance&lt;/h2&gt;
&lt;p&gt;Gemini released the new &lt;a href="https://gemini.google/overview/canvas/"&gt;Canvas&lt;/a&gt; tool a few days ago which immediately blew my mind. You …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 20 Mar 2025 20:43:32 -0400</pubDate><guid>tag:blog.ericturner.it,2025-03-20:/2025/03/20/web-dev-rss-reader-app-01/</guid><category>Dev</category><category>generative-ai</category><category>nodejs</category><category>react</category><category>rss-reader-app</category></item><item><title>Malware Dev – Chapter 07 – Anti-Disassembly Strategies</title><link>https://blog.ericturner.it/2025/03/15/malware-dev-chapter-06-anti-disassembly-strategies/</link><description>&lt;p&gt;Continued series from the&amp;nbsp;&lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;br/&gt;
GitHub repo:&amp;nbsp;&lt;a href="https://github.com/EricTurner3/cybersecurity/tree/main/Malware_Development"&gt;EricTurner3 &amp;ndash; Malware_Development&lt;/a&gt;.&lt;/p&gt;
&lt;h1 id="opcode-assembly-obfuscation"&gt;Opcode / Assembly Obfuscation&lt;/h1&gt;
&lt;p&gt;The main point of opcode obfuscation is to make it harder for the analyst to decompile the code. Other sources seem to refer to this as directly making changes to the assembly or …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 15 Mar 2025 19:12:23 -0400</pubDate><guid>tag:blog.ericturner.it,2025-03-15:/2025/03/15/malware-dev-chapter-06-anti-disassembly-strategies/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev – Chapter 06 – Anti-VM Strategies</title><link>https://blog.ericturner.it/2025/02/15/malware-dev-chapter-06-anti-vm-strategies/</link><description>&lt;p&gt;Continued series from the&amp;nbsp;&lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;br/&gt;
GitHub repo:&amp;nbsp;&lt;a href="https://github.com/EricTurner3/cybersecurity/tree/main/Malware_Development"&gt;EricTurner3 &amp;ndash; Malware_Development&lt;/a&gt;.&lt;/p&gt;
&lt;h1 id="filesystem-detection-techniques"&gt;Filesystem Detection Techniques&lt;/h1&gt;
&lt;h2 id="virtualbox-machine-detection"&gt;VirtualBox Machine Detection&lt;/h2&gt;
&lt;p&gt;The book showcases 8 different files to test for a VirtualBox, however, the sample code only checks for 2/8 files. I created a modified source code that uses an …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 15 Feb 2025 19:51:53 -0500</pubDate><guid>tag:blog.ericturner.it,2025-02-15:/2025/02/15/malware-dev-chapter-06-anti-vm-strategies/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev - Chapter 05 - Anti-Debugging Tricks</title><link>https://blog.ericturner.it/2025/01/29/malware-dev-chapter-05-anti-debugging-tricks/</link><description>&lt;p&gt;Continued series from the&amp;nbsp;&lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;br/&gt;
GitHub repo:&amp;nbsp;&lt;a href="https://github.com/EricTurner3/cybersecurity/tree/main/Malware_Development"&gt;EricTurner3 &amp;ndash; Malware_Development&lt;/a&gt;.&lt;/p&gt;
&lt;h1 id="detecting-debugger"&gt;Detecting Debugger&lt;/h1&gt;
&lt;h2 id="isdebuggerpresent"&gt;IsDebuggerPresent()&lt;/h2&gt;
&lt;div class="highlight"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="cm"&gt;/*&lt;/span&gt;
&lt;span class="cm"&gt;    Anti-Debugging - Check for Debugger&lt;/span&gt;
&lt;span class="cm"&gt;    28 Jan 2025&lt;/span&gt;
&lt;span class="cm"&gt;    Eric&lt;/span&gt;

&lt;span class="cm"&gt;    To build: x86_64-w64-mingw32-gcc 05_debugger_present.c -o DebugCheck.exe -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc&lt;/span&gt;
&lt;span class="cm"&gt;*/&lt;/span&gt;
&lt;span class="cp"&gt;#include&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="cpf"&gt;&amp;lt;stdio.h&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;#include&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="cpf"&gt;&amp;lt;stdlib.h&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;#include&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="cpf"&gt;&amp;lt;windows.h …&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 29 Jan 2025 02:57:57 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-29:/2025/01/29/malware-dev-chapter-05-anti-debugging-tricks/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev - Chapter 04 - Privilege Escalation</title><link>https://blog.ericturner.it/2025/01/25/malware-dev-chapter-04-privilege-escalation/</link><description>&lt;p&gt;Continued series from the&amp;nbsp;&lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;br/&gt;
GitHub repo:&amp;nbsp;&lt;a href="https://github.com/EricTurner3/cybersecurity/tree/main/Malware_Development"&gt;EricTurner3 &amp;ndash; Malware_Development&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This chapter contains methods to achieve persistence of malware in Windows.&lt;/p&gt;
&lt;h1 id="manipulating-access-tokens"&gt;Manipulating Access Tokens&lt;/h1&gt;
&lt;h2 id="token-theft"&gt;Token Theft&lt;/h2&gt;
&lt;p&gt;The book provides a great demonstration of C code where the end user can pass a PID and it attempts …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 25 Jan 2025 19:25:23 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-25:/2025/01/25/malware-dev-chapter-04-privilege-escalation/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev - Chapter 03 - Persistence</title><link>https://blog.ericturner.it/2025/01/21/malware-dev-chapter-03-persistence/</link><description>&lt;p&gt;Continued series from the&amp;nbsp;&lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;br/&gt;
GitHub repo: &lt;a href="https://github.com/EricTurner3/cybersecurity/tree/main/Malware_Development"&gt;EricTurner3 - Malware_Development&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This chapter contains methods to achieve persistence of malware in Windows.&lt;/p&gt;
&lt;h1 id="registry-keys"&gt;Registry Keys&lt;/h1&gt;
&lt;h2 id="run-registry-key"&gt;Run Registry Key&lt;/h2&gt;
&lt;p&gt;The book utilizes a dummy code to pop up a message window using the registry persistence. I re-used my reverse …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 21 Jan 2025 00:34:05 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-21:/2025/01/21/malware-dev-chapter-03-persistence/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev - Chapter 02 - Injection</title><link>https://blog.ericturner.it/2025/01/19/malware-dev-chapter-02-injection/</link><description>&lt;p&gt;Continued series from the &lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers Book&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The first part of this chapter deals with process and DLL injection. I will break the APC injection and API hooking&lt;/p&gt;
&lt;h2 id="process-injection"&gt;Process Injection&lt;/h2&gt;
&lt;p&gt;I followed the book in generating a reverse shell payload using &lt;code&gt;msfvenom&lt;/code&gt;:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;msfvenom&lt;span class="w"&gt; &lt;/span&gt;-p&lt;span class="w"&gt; &lt;/span&gt;windows/x64/shell_reverse_tcp …&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sun, 19 Jan 2025 18:53:32 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-19:/2025/01/19/malware-dev-chapter-02-injection/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Dev - Chapter 01</title><link>https://blog.ericturner.it/2025/01/18/malware-dev-chapter-01/</link><description>&lt;p&gt;I recently picked several new books from Packt, including &lt;a href="https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801810173"&gt;Malware Development for Ethical Hackers&lt;/a&gt;. This book aims to demonstrate some of the techniques seen in malware, and showcase writing similar samples using C/C++ for both Windows and Linux operating systems.  &lt;/p&gt;
&lt;p&gt;My codebase as I work through this book can …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 18 Jan 2025 20:57:43 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-18:/2025/01/18/malware-dev-chapter-01/</guid><category>Cybersecurity</category><category>c-cpp</category><category>malware-dev</category></item><item><title>Malware Analysis - Mirai Wicked Sample - 9Jan2025</title><link>https://blog.ericturner.it/2025/01/11/malware-analysis-mirai-wicked-sample-9jan2025/</link><description>&lt;p&gt;Analysis of a sample from Malware bazaar: &lt;a href="https://bazaar.abuse.ch/sample/a01d53662d83c31a5b4478bc57fc4fee1ba9d4f6178a94a107c472133adea368/"&gt;MalwareBazaar | SHA256 a01d53662d83c31a5b4478bc57fc4fee1ba9d4f6178a94a107c472133adea368 (Mirai)&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="stage-1"&gt;Stage 1&lt;/h1&gt;
&lt;p&gt;The initial download is a linux script in cleartext with comments in Chinese. I have added english translations in brackets for each comment. This script connects to a server in order to download 13 binaries, one for …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 11 Jan 2025 21:03:17 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-11:/2025/01/11/malware-analysis-mirai-wicked-sample-9jan2025/</guid><category>Cybersecurity</category><category>botnet</category><category>malware-analysis</category><category>mirai</category></item><item><title>🔒 HackTheBox - Sherlock - Lovely Malware</title><link>https://blog.ericturner.it/2025/01/08/hackthebox-sherlock-lovely-malware/</link><description>This investigation is currently active on HackTheBox, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution, or if you have already solved this challenge, use the answer to task 14 to unlock.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 08 Jan 2025 03:19:22 -0500</pubDate><guid>tag:blog.ericturner.it,2025-01-08:/2025/01/08/hackthebox-sherlock-lovely-malware/</guid><category>Cybersecurity</category><category>htb-insane</category><category>windows</category><category>hackthebox</category><category>pentesting</category><category>malware-analysis</category></item><item><title>HackTheBox Sherlock: Subatomic</title><link>https://blog.ericturner.it/2024/12/31/hackthebox-sherlock-subatomic/</link><description>&lt;p&gt;Challenge: &lt;a href="https://app.hackthebox.com/sherlocks/Subatomic"&gt;https://app.hackthebox.com/sherlocks/Subatomic&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;Forela is in need of your assistance. They were informed by an employee that their Discord account had been used to send a message with a link to a file they suspect is malware. The message read: "Hi! I've been working on …&lt;/p&gt;&lt;/blockquote&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 31 Dec 2024 20:14:00 -0500</pubDate><guid>tag:blog.ericturner.it,2024-12-31:/2024/12/31/hackthebox-sherlock-subatomic/</guid><category>HackTheBox</category><category>htb-medium</category><category>unlocked-walkthrough</category></item><item><title>Malware Digitally Signed by Microsoft</title><link>https://blog.ericturner.it/2024/12/30/malware-digitally-signed-by-microsoft/</link><description>&lt;p&gt;While working on a sherlock from HackTheBox, I researched a tactic of threat actors abusing the Microsoft driver signing process to allow their malware to be digitally signed by Microsoft.&lt;/p&gt;
&lt;h1 id="general-information"&gt;General Information&lt;/h1&gt;
&lt;p&gt;An example of this from the Google Cloud / Mandiant blog post:&lt;br/&gt;
&lt;a href="https://www.virustotal.com/gui/file/4257ece19a9e4abc1eb251463bce623d2ac45afd0ed7939ba5e76ee9dbde2fa5"&gt;VirusTotal - File - 4257ece19a9e4abc1eb251463bce623d2ac45afd0ed7939ba5e76ee9dbde2fa5&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2024/12/image-15.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Detection page for the …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Mon, 30 Dec 2024 14:21:47 -0500</pubDate><guid>tag:blog.ericturner.it,2024-12-30:/2024/12/30/malware-digitally-signed-by-microsoft/</guid><category>Cybersecurity</category></item><item><title>🔒 HackTheBox Sherlock - Heartbreaker-Continuum</title><link>https://blog.ericturner.it/2024/12/28/hackthebox-sherlock-heartbreaker-continuum/</link><description>This challenge is currently active on HackTheBox, thus is required to be password protected. You will need to wait until the challenge is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sat, 28 Dec 2024 23:41:34 -0500</pubDate><guid>tag:blog.ericturner.it,2024-12-28:/2024/12/28/hackthebox-sherlock-heartbreaker-continuum/</guid><category>HackTheBox</category><category>active</category><category>htb-easy</category><category>htb-sherlock</category></item><item><title>TryHackMe: Advent of Cyber 2024</title><link>https://blog.ericturner.it/2024/12/25/tryhackme-advent-of-cyber-2024/</link><description>&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2024/12/image.webp"/&gt;&lt;/p&gt;
&lt;p&gt;I've spent the past few weeks tackling &lt;a href="https://tryhackme.com/r/room/adventofcyber2024"&gt;TryHackMe's Advent of Cyber 2024&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Some of my favorite challenges were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Day 1 OPSEC, searching online to try and find similar strings via GitHub to link back to the attacker&lt;/li&gt;
&lt;li&gt;Day 7 AWS Log Analysis, I'm not super versed in cloud security, this …&lt;/li&gt;&lt;/ul&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 25 Dec 2024 00:20:44 -0500</pubDate><guid>tag:blog.ericturner.it,2024-12-25:/2024/12/25/tryhackme-advent-of-cyber-2024/</guid><category>Cybersecurity</category></item><item><title>S550 Mustang IPC Reverse Engineering</title><link>https://blog.ericturner.it/2024/02/04/s550-mustang-ipc-reverse-engineering/</link><description>&lt;p&gt;Note: This post was published 4 Feb 2024, but was based off of research and work completed back in May 2023.&lt;/p&gt;
&lt;h1 id="introduction-video-walkthrough"&gt;Introduction &amp;amp; Video Walkthrough&lt;/h1&gt;
&lt;p&gt;https://www.youtube.com/watch?v=OzUs28GIq0A&lt;/p&gt;
&lt;p&gt;Back in 2020, I removed the analog instrument cluster from my 2015 Mustang GT Premium to upgrade it to …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Sun, 04 Feb 2024 14:50:50 -0500</pubDate><guid>tag:blog.ericturner.it,2024-02-04:/2024/02/04/s550-mustang-ipc-reverse-engineering/</guid><category>Automotive</category><category>automotive-hacking</category></item><item><title>Top 200 Verbs in Italian</title><link>https://blog.ericturner.it/2023/04/20/top-200-verbs-in-italian/</link><description>&lt;p&gt;Ecco l'elenco dei 200 verbi pi&amp;ugrave; importanti in italiano.&lt;/p&gt;
&lt;p&gt;italiano&lt;/p&gt;
&lt;p&gt;English&lt;/p&gt;
&lt;p&gt;abitare &amp;nbsp;&lt;/p&gt;
&lt;p&gt;to live in&lt;/p&gt;
&lt;p&gt;abituarsi &amp;nbsp;&lt;/p&gt;
&lt;p&gt;to get used to&lt;/p&gt;
&lt;p&gt;accadere&lt;/p&gt;
&lt;p&gt;to happen&lt;/p&gt;
&lt;p&gt;accendere&lt;/p&gt;
&lt;p&gt;to turn on / switch on&lt;/p&gt;
&lt;p&gt;acquista&lt;/p&gt;
&lt;p&gt;to buy&lt;/p&gt;
&lt;p&gt;affittare&lt;/p&gt;
&lt;p&gt;to rent out&lt;/p&gt;
&lt;p&gt;aiutare &amp;nbsp;&lt;/p&gt;
&lt;p&gt;to help&lt;/p&gt;
&lt;p&gt;amare &amp;nbsp;&lt;/p&gt;
&lt;p&gt;to love&lt;/p&gt;
&lt;p&gt;andare &amp;nbsp;&lt;/p&gt;
&lt;p&gt;to go&lt;/p&gt;
&lt;p&gt;apparire&lt;/p&gt;
&lt;p&gt;to appear&lt;/p&gt;
&lt;p&gt;appartenere a …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 20 Apr 2023 21:24:53 -0400</pubDate><guid>tag:blog.ericturner.it,2023-04-20:/2023/04/20/top-200-verbs-in-italian/</guid><category>Languages</category><category>italian</category></item><item><title>QAKBot Campaign 6Apr2023</title><link>https://blog.ericturner.it/2023/04/18/qakbot-campaign-6apr2023/</link><description>&lt;h2 id="correspondence"&gt;Correspondence&lt;/h2&gt;
&lt;p&gt;Sender&lt;/p&gt;
&lt;p&gt;Subject&lt;/p&gt;
&lt;p&gt;Attachment Name&lt;/p&gt;
&lt;p&gt;Attachment Hash (with VirusTotal link)&lt;/p&gt;
&lt;p&gt;clemke[@]e-chuppah[.]com&lt;/p&gt;
&lt;p&gt;RE: New Borrowers&lt;/p&gt;
&lt;p&gt;AK.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.virustotal.com/gui/file/9521bc74735d1300e182eaa98299023ba08acc9af17b85cc50b3938c99bd0b32"&gt;9521bc74735d1300e182eaa98299023ba08acc9af17b85cc50b3938c99bd0b32&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;aschaden[@]shopbarbay[.]com&lt;/p&gt;
&lt;p&gt;FW: Check Image Request&lt;/p&gt;
&lt;p&gt;NI.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.virustotal.com/gui/file/93482d229926521cfc0000bda2e931181e0f06f4a9f808f0068634678ae9a0fc"&gt;93482d229926521cfc0000bda2e931181e0f06f4a9f808f0068634678ae9a0fc&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;wtremblay[@]aaofoo[.]com&lt;/p&gt;
&lt;p&gt;RE: Cashing Third Party Checks&lt;/p&gt;
&lt;p&gt;CT.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.virustotal.com/gui/file/77a2b75334a8e3a4e2960e0c1600a1ea14933bba1f4a7297ad177e140f3302f2"&gt;77a2b75334a8e3a4e2960e0c1600a1ea14933bba1f4a7297ad177e140f3302f2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;se[.]jursnaeb[@]adyasiddhi[.]com&lt;/p&gt;
&lt;p&gt;RE: Hello--&lt;/p&gt;
&lt;p&gt;TX.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.virustotal.com/gui/file/3a0141a9b22639c969244967676c999757406383cf8eb0eb75a9e89176661045"&gt;3a0141a9b22639c969244967676c999757406383cf8eb0eb75a9e89176661045&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 18 Apr 2023 12:04:00 -0400</pubDate><guid>tag:blog.ericturner.it,2023-04-18:/2023/04/18/qakbot-campaign-6apr2023/</guid><category>Cybersecurity</category><category>phishing</category><category>qakbot</category></item><item><title>Trojan.Kryptic - 22 Mar 2023</title><link>https://blog.ericturner.it/2023/03/22/trojan-kryptic-22-mar-2023/</link><description>&lt;h1 id="initial-email"&gt;Initial Email&lt;/h1&gt;
&lt;p&gt;An email was discovered from comel[@]industry-mass[.]com. This site was created within the last 15 days.&lt;br/&gt;
The email was titled Tax return 2022 and contained a .docx file.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2024/12/image-5.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Opening this file initially looks like an actual tax return. I have redacted the private information from the screenshot …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 22 Mar 2023 15:37:00 -0400</pubDate><guid>tag:blog.ericturner.it,2023-03-22:/2023/03/22/trojan-kryptic-22-mar-2023/</guid><category>Cybersecurity</category></item><item><title>Bigliettino di Siri (Siri Cheat Sheet)</title><link>https://blog.ericturner.it/2023/03/16/bigliettino-di-siri-siri-cheat-sheet/</link><description>&lt;p&gt;I've found that Siri can be great for practicing speaking and listening in a new language, plus it helps you learn critical phrases that are used on a day to day basis. Here's a cheat sheet of things to ask Siri. Most of this was sourced from the Apple Support …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 16 Mar 2023 21:23:20 -0400</pubDate><guid>tag:blog.ericturner.it,2023-03-16:/2023/03/16/bigliettino-di-siri-siri-cheat-sheet/</guid><category>Languages</category><category>italian</category></item><item><title>Odd phishing link</title><link>https://blog.ericturner.it/2022/04/22/odd-phishing-link/</link><description>&lt;p&gt;Friend sent me a strange message she got with the following link:  &lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2022/04/image-7.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Thanks government, for giving me my money back on some strange link&lt;/p&gt;
&lt;h1 id="attempt-1-www"&gt;Attempt 1: www&lt;/h1&gt;
&lt;p&gt;I booted into my REMnux VM and turned on Burp suite to intercept the traffic. If you leave off the trailing slash (like …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 22 Apr 2022 00:54:07 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-22:/2022/04/22/odd-phishing-link/</guid><category>Cybersecurity</category><category>phishing</category></item><item><title>🔒 BTLO - Investigation: Xhell</title><link>https://blog.ericturner.it/2022/04/20/btlo-investigation-xhell/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 20 Apr 2022 12:22:46 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-20:/2022/04/20/btlo-investigation-xhell/</guid><category>Blue Team Labs Online</category></item><item><title>🔒 BTLO - Investigation: Link</title><link>https://blog.ericturner.it/2022/04/15/btlo-investigation-link/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 15 Apr 2022 12:47:14 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-15:/2022/04/15/btlo-investigation-link/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 BTLO - Investigation: Exxtensity</title><link>https://blog.ericturner.it/2022/04/11/btlo-investigation/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Mon, 11 Apr 2022 17:54:24 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-11:/2022/04/11/btlo-investigation/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 BTLO - Investigation: Exposed</title><link>https://blog.ericturner.it/2022/04/07/btlo-investigation-exposed/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 07 Apr 2022 14:08:17 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-07:/2022/04/07/btlo-investigation-exposed/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>Finding x-callback-url / Deep Link of iOS Apps</title><link>https://blog.ericturner.it/2022/04/01/finding-x-callback-url-deep-link-of-ios-apps/</link><description>&lt;p&gt;I find often I like doing automations between apps. While you can use the &lt;code&gt;Open App&lt;/code&gt; functionality with Shortcuts, trying to open an app from something like a Reminder requires a URL. This guide shows you how to get the iOS App from the App Store for investigation and then …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 01 Apr 2022 14:56:06 -0400</pubDate><guid>tag:blog.ericturner.it,2022-04-01:/2022/04/01/finding-x-callback-url-deep-link-of-ios-apps/</guid><category>Cybersecurity</category><category>automation</category><category>x-callback-url</category></item><item><title>🔒 BTLO - Challenge: ThePackage</title><link>https://blog.ericturner.it/2022/03/31/btlo-challenge-thepackage/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 31 Mar 2022 15:21:21 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-31:/2022/03/31/btlo-challenge-thepackage/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-challenge</category></item><item><title>🔒 BTLO - Challenge: Source</title><link>https://blog.ericturner.it/2022/03/31/btlo-challenge-source/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 31 Mar 2022 13:07:23 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-31:/2022/03/31/btlo-challenge-source/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-challenge</category></item><item><title>🔒 BTLO - Challenge: Bruteforce</title><link>https://blog.ericturner.it/2022/03/31/btlo-challenge-bruteforce/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 31 Mar 2022 12:42:34 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-31:/2022/03/31/btlo-challenge-bruteforce/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-challenge</category></item><item><title>🔒 BTLO - Investigation: Eric</title><link>https://blog.ericturner.it/2022/03/29/btlo-investigation-eric/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 29 Mar 2022 17:53:10 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-29:/2022/03/29/btlo-investigation-eric/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 BTLO - Investigation: Heaven</title><link>https://blog.ericturner.it/2022/03/25/btlo-investigation-heaven/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 25 Mar 2022 16:03:42 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-25:/2022/03/25/btlo-investigation-heaven/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 HackTheBox - GamePwn Challenge: CubeMadness1</title><link>https://blog.ericturner.it/2022/03/23/hackthebox-gamepwn-challenge-cubemadness1/</link><description>This is currently an active challenge/machine on HackTheBox. Per their ToS, active writeups are not allowed to be shared. In order to unlock this content, you will need to provide the final flag.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 23 Mar 2022 16:27:08 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-23:/2022/03/23/hackthebox-gamepwn-challenge-cubemadness1/</guid><category>HackTheBox</category><category>htb-challenge</category><category>htb-veryeasy</category></item><item><title>🔒 BTLO - Investigation: Crypto</title><link>https://blog.ericturner.it/2022/03/22/btlo-investigation-crypto/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 22 Mar 2022 14:28:50 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-22:/2022/03/22/btlo-investigation-crypto/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>BTLO - Investigation: BEN</title><link>https://blog.ericturner.it/2022/03/18/btlo-investigation-ben/</link><description>&lt;p&gt;Link: &lt;a href="https://blueteamlabs.online/home/investigation/96"&gt;https://blueteamlabs.online/home/investigation/96&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Ben was working very hard at FaanG industries to get a maximum percentage of the hike. He was talking about this with his HR as well. While he was preparing for a Salary Negotiation meeting, Ben received a phishing email and an attachment …&lt;/p&gt;&lt;/blockquote&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 18 Mar 2022 17:09:47 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-18:/2022/03/18/btlo-investigation-ben/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 BTLO - Investigation: RDP</title><link>https://blog.ericturner.it/2022/03/17/btlo-investigation-rdp/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You will need to wait until the investigation is retired for the full solution. In special circumstances, you may email me for the password.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 17 Mar 2022 13:55:13 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-17:/2022/03/17/btlo-investigation-rdp/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>🔒 BTLO: Investigation - Deep Blue</title><link>https://blog.ericturner.it/2022/03/16/btlo-investigation-deep-blue/</link><description>This investigation is currently active on Blue Team Labs Online, thus is required to be password protected. You can unlock this challenge by using the last password requested, or wait until the investigation is retired.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 16 Mar 2022 14:26:25 -0400</pubDate><guid>tag:blog.ericturner.it,2022-03-16:/2022/03/16/btlo-investigation-deep-blue/</guid><category>Blue Team Labs Online</category><category>btlo</category><category>btlo-investigation</category></item><item><title>HackTheBox: Context Fortress</title><link>https://blog.ericturner.it/2022/03/11/hackthebox-context-fortress/</link><description>&lt;p&gt;&lt;img alt="No alternative text description for this image" src="https://media-exp1.licdn.com/dms/image/C4E22AQHW1sBRzR2wSg/feedshare-shrink_800/0/1647035358572?e=1649894400&amp;amp;v=beta&amp;amp;t=J7DsURsGl8Uzbh3-Yi5jGxbxrhObuIkf-2mrrrlZa1E"/&gt;&lt;/p&gt;
&lt;p&gt;Done!&lt;/p&gt;
&lt;p&gt;After several long days, I finally was able to pwn my first fortress on HackTheBox! Context by &lt;a href="https://contextis.com/"&gt;Context Information Security&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;This particular challenge had seven flags and had me exploit my way through a vulnerable web app, into a Windows Domained machine and compromise several web and domain users …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 11 Mar 2022 22:37:00 -0500</pubDate><guid>tag:blog.ericturner.it,2022-03-11:/2022/03/11/hackthebox-context-fortress/</guid><category>HackTheBox</category><category>htb-fortress</category></item><item><title>HackTheBox: Forensics Challenge - Red Failure</title><link>https://blog.ericturner.it/2022/03/02/hackthebox-forensics-challenge-red-failure/</link><description>&lt;p&gt;Note: I am stumped on this particular challenge. Below is how far I've gotten.&lt;/p&gt;
&lt;p&gt;Link: &lt;a href="https://app.hackthebox.com/challenges/red-failure"&gt;https://app.hackthebox.com/challenges/red-failure&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;During a recent red team engagement one of our servers got compromised. Upon completion the red team should have deleted any malicious artifact or persistence mechanism used throughout the …&lt;/p&gt;&lt;/blockquote&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 02 Mar 2022 17:17:28 -0500</pubDate><guid>tag:blog.ericturner.it,2022-03-02:/2022/03/02/hackthebox-forensics-challenge-red-failure/</guid><category>HackTheBox</category><category>forensics</category><category>htb-challenge</category><category>htb-medium</category><category>stumped</category></item><item><title>HackTheBox: Forensics Challenge – MarketDump</title><link>https://blog.ericturner.it/2022/02/25/hackthebox-forensics-challenge-marketdump/</link><description>&lt;p&gt;Link: &lt;a href="https://app.hackthebox.com/challenges/marketdump"&gt;https://app.hackthebox.com/challenges/marketdump&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This challenge provides us with a .zip that only contains a single MarketDump.pcapng file. The challenge description reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We have got informed that a hacker managed to get into our internal network after pivoting through the web platform that runs in public …&lt;/p&gt;&lt;/blockquote&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 25 Feb 2022 16:12:10 -0500</pubDate><guid>tag:blog.ericturner.it,2022-02-25:/2022/02/25/hackthebox-forensics-challenge-marketdump/</guid><category>HackTheBox</category><category>forensics</category><category>htb-challenge</category></item><item><title>HackTheBox: Forensics Challenge - Reminiscent</title><link>https://blog.ericturner.it/2022/02/24/hackthebox-forensics-challenge-reminiscent/</link><description>&lt;p&gt;Link: &lt;a href="https://app.hackthebox.com/challenges/reminiscent"&gt;https://app.hackthebox.com/challenges/reminiscent&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Our unzipped folder gives us a &lt;code&gt;Resume.eml&lt;/code&gt;, &lt;code&gt;imageinfo.txt&lt;/code&gt; and &lt;code&gt;flounder-pc-memdump.elf&lt;/code&gt; memory dump file.&lt;/p&gt;
&lt;p&gt;Let's check out the email message. I ran &lt;code&gt;cat Resume.eml&lt;/code&gt; which nets us:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="k"&gt;Return&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="k"&gt;Path&lt;/span&gt;&lt;span class="err"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;bloodworm&lt;/span&gt;&lt;span class="nv"&gt;@madlab&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;lcl&lt;/span&gt;
&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Delivered&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="k"&gt;To&lt;/span&gt;&lt;span class="err"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;madlab&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;lcl&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;flounder&lt;/span&gt;&lt;span class="nv"&gt;@madlab&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;lcl&lt;/span&gt;
&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;Received …&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 24 Feb 2022 19:56:55 -0500</pubDate><guid>tag:blog.ericturner.it,2022-02-24:/2022/02/24/hackthebox-forensics-challenge-reminiscent/</guid><category>HackTheBox</category><category>forensics</category></item><item><title>Wordle Reverse Engineered</title><link>https://blog.ericturner.it/2022/01/31/wordle-reversed/</link><description>&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2022/01/image-30.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Wordle Share Grid&lt;/p&gt;
&lt;p&gt;I've been seeing posts for this wordle game on my facebook, and it seems to be alight on Twitter as well. I decided to try the game today and was able to get it on my fourth try! It was pretty fun. But, I wanted to see …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Mon, 31 Jan 2022 15:20:01 -0500</pubDate><guid>tag:blog.ericturner.it,2022-01-31:/2022/01/31/wordle-reversed/</guid><category>Cybersecurity</category></item><item><title>Malware Analysis #2</title><link>https://blog.ericturner.it/2022/01/12/malware-analysis-2/</link><description>&lt;p&gt;SHA256 Hash: 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c&lt;/p&gt;
&lt;p&gt;I searched the daily list of MalShare.com and pulled a random hash for investigation today, downloaded through my REMnux box and then used a Python web server to pull it onto my Windows box, since my windows vm has no internet connection.&lt;/p&gt;
&lt;h1 id="static-analysis"&gt;Static Analysis&lt;/h1&gt;
&lt;p&gt;I renamed …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 12 Jan 2022 20:27:12 -0500</pubDate><guid>tag:blog.ericturner.it,2022-01-12:/2022/01/12/malware-analysis-2/</guid><category>Cybersecurity</category><category>malware-analysis</category></item><item><title>Malware Analysis - #1</title><link>https://blog.ericturner.it/2022/01/11/malware-analysis-1/</link><description>&lt;p&gt;See &lt;a href="https://blog.ericturner.local/2022/01/10/malware-analysis-lab/"&gt;here&lt;/a&gt; on my post on creating your own Malware Analysis lab!&lt;/p&gt;
&lt;p&gt;I created an account on &lt;a href="https://virusshare.com/"&gt;VirusShare&lt;/a&gt; to download some malware samples. I downloaded the first one so let's dive in and see what we can discover!&lt;/p&gt;
&lt;p&gt;The SHA256 for my download was: &lt;code&gt;2db4caf14befbe99a9cf51ed7f7c3cade9df666c45579baaffc9e5a53c0b773c&lt;/code&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;I downloaded the zip and …&lt;/li&gt;&lt;/ul&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 11 Jan 2022 16:04:25 -0500</pubDate><guid>tag:blog.ericturner.it,2022-01-11:/2022/01/11/malware-analysis-1/</guid><category>Cybersecurity</category><category>malware-analysis</category></item><item><title>Malware Analysis Lab</title><link>https://blog.ericturner.it/2022/01/10/malware-analysis-lab/</link><description>&lt;p&gt;I decided to try and get into my own malware analysis, but I needed to create my own lab for safe testing. I wanted to outline how I set mine up.&lt;/p&gt;
&lt;p&gt;Update 2 Mar 2022: I migrated from VirtualBox to Parallels 16 and I get MUCH better performance, even when …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Mon, 10 Jan 2022 18:30:58 -0500</pubDate><guid>tag:blog.ericturner.it,2022-01-10:/2022/01/10/malware-analysis-lab/</guid><category>Cybersecurity</category><category>malware-analysis</category></item><item><title>TryHackMe: Basic Malware RE</title><link>https://blog.ericturner.it/2022/01/07/tryhackme-basic-malware-re/</link><description>&lt;p&gt;Link: &lt;a href="https://tryhackme.com/room/basicmalwarere"&gt;https://tryhackme.com/room/basicmalwarere&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is another one of the free rooms in the &lt;a href="https://tryhackme.com/module/malware-analysis"&gt;Malware Analysis Module&lt;/a&gt; of TryHackMe.&lt;/p&gt;
&lt;p&gt;This is a challenge room, where we are given files and just need to try a flag, instead of a more guided learning room.&lt;/p&gt;
&lt;h1 id="challenge-1"&gt;Challenge 1&lt;/h1&gt;
&lt;p&gt;Running &lt;code&gt;strings&lt;/code&gt; on …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 07 Jan 2022 14:20:35 -0500</pubDate><guid>tag:blog.ericturner.it,2022-01-07:/2022/01/07/tryhackme-basic-malware-re/</guid><category>Pentesting</category><category>thm-medium</category></item><item><title>Hack The Box - Driver</title><link>https://blog.ericturner.it/2021/10/04/hack-the-box-driver/</link><description>&lt;p&gt;Link: &lt;a href="https://app.hackthebox.eu/machines/Driver"&gt;https://app.hackthebox.eu/machines/Driver&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="enumeration"&gt;Enumeration&lt;/h1&gt;
&lt;h2 id="tcp-port-scan"&gt;TCP Port Scan&lt;/h2&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2021/10/image.webp"/&gt;&lt;/p&gt;
&lt;p&gt;nmap top 1000 ports with version detection&lt;/p&gt;
&lt;p&gt;Our port scan reveals a possible windows 7-10 machine with a web server up.&lt;/p&gt;
&lt;p&gt;I used metasploits' &lt;code&gt;auxiliary/scanner/smb/smb_version&lt;/code&gt; to find the SMB and Windows version and it returned SMB …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Mon, 04 Oct 2021 15:31:18 -0400</pubDate><guid>tag:blog.ericturner.it,2021-10-04:/2021/10/04/hack-the-box-driver/</guid><category>HackTheBox</category><category>htb-easy</category><category>windows</category></item><item><title>HackTheBox - Bolt</title><link>https://blog.ericturner.it/2021/10/01/hackthebox-bolt/</link><description>&lt;p&gt;Link: &lt;a href="https://app.hackthebox.eu/machines/Bolt"&gt;https://app.hackthebox.eu/machines/Bolt&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="enumeration"&gt;Enumeration&lt;/h1&gt;
&lt;h2 id="tcp-port-scan"&gt;TCP Port Scan&lt;/h2&gt;
&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2021/09/image-94.webp"/&gt;&lt;/p&gt;
&lt;p&gt;nmap top 1000 ports tcp port scan with version detection&lt;/p&gt;
&lt;p&gt;Preliminary port scan reveals SSH on port 22 and two web servers on ports 80 and 443.&lt;/p&gt;
&lt;h2 id="ssl-web-server"&gt;SSL Web Server&lt;/h2&gt;
&lt;p&gt;Attempting to access the https version of the website …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 01 Oct 2021 11:31:20 -0400</pubDate><guid>tag:blog.ericturner.it,2021-10-01:/2021/10/01/hackthebox-bolt/</guid><category>HackTheBox</category><category>htb-medium</category><category>linux</category><category>unlocked-walkthrough</category></item><item><title>Hack The Box Academy - Buffer Overflow on Linux x86</title><link>https://blog.ericturner.it/2021/08/13/hack-the-box-academy-buffer-overflow-on-linux-x86/</link><description>&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2021/08/image-95.webp"/&gt;&lt;/p&gt;
&lt;p&gt;While attempting a different reverse engineering / pwn challenge, I realized I needed more background knowledge on how to properly do a buffer overflow, thus I took the Stack-Based Buffer Overflows on Linux x86 case from HTB academy. This is my writeup of the final Skills Assessment&lt;/p&gt;
&lt;h1 id="discovery"&gt;Discovery&lt;/h1&gt;
&lt;p&gt;First we need …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 13 Aug 2021 17:04:19 -0400</pubDate><guid>tag:blog.ericturner.it,2021-08-13:/2021/08/13/hack-the-box-academy-buffer-overflow-on-linux-x86/</guid><category>HackTheBox</category></item><item><title>📌 Password Protection for Writeups</title><link>https://blog.ericturner.it/2021/08/12/password-protection-for-htb-writeups/</link><description>&lt;p&gt;Multiple platforms, HackTheBox, TryHackMe, BlueTeamLabsOnline, express they do not want the answers/flags posted until the challenge is retired. Thus, for any active challenge on these platforms, the bulk of the content is password protected.  &lt;/p&gt;
&lt;p&gt;For password-protected challenge write-ups: use the challenge flag as the password to the blog post …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Thu, 12 Aug 2021 17:48:34 -0400</pubDate><guid>tag:blog.ericturner.it,2021-08-12:/2021/08/12/password-protection-for-htb-writeups/</guid><category>Announcements</category></item><item><title>2018+ Mustang Technology Retrofit</title><link>https://blog.ericturner.it/2020/08/26/2018-mustang-technology-retrofit/</link><description>&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2020/08/IMG_7984.webp"/&gt;&lt;/p&gt;
&lt;p&gt;Before the retrofit, my original cluster with Sync 2 (MyFordTouch) system  &lt;/p&gt;
&lt;p&gt;I know I bought my vehicle at a higher mileage (50k) but I have loved essentially every detail of it. However, I definitely liked the new technology in the 2018+ models including a new digital speedometer cluster and the …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Wed, 26 Aug 2020 13:46:52 -0400</pubDate><guid>tag:blog.ericturner.it,2020-08-26:/2020/08/26/2018-mustang-technology-retrofit/</guid><category>Automotive</category></item><item><title>📌 Italian Conjugation / Verb Tense Cheat Sheet</title><link>https://blog.ericturner.it/2019/12/20/italian-verb-tense-cheat-sheet/</link><description>&lt;p&gt;&lt;img alt="" src="https://blog.ericturner.it/uploads/2019/12/image.webp"/&gt;&lt;/p&gt;
&lt;p&gt;View of the verb tense sheet&lt;/p&gt;
&lt;p&gt;I have been using Busuu to learn Italian for the past few weeks (2020 new years resolution is to learn as much Italian as I can!). However all the varying verb tenses can be hard to keep up on. Here is a cheat sheet …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Fri, 20 Dec 2019 14:22:08 -0500</pubDate><guid>tag:blog.ericturner.it,2019-12-20:/2019/12/20/italian-verb-tense-cheat-sheet/</guid><category>Languages</category><category>italian</category><category>cheat-sheet</category></item><item><title>End of Year Device Check In App</title><link>https://blog.ericturner.it/2019/03/05/end-of-year-device-check-in-app/</link><description>&lt;p&gt;Another application I built at work, during the month of February, that I am super proud of is a way for us to check in devices at our high school. Essentially, a teacher logs in and the application will automatically pull a list of the teacher's classes. Then the teacher …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 05 Mar 2019 17:01:56 -0500</pubDate><guid>tag:blog.ericturner.it,2019-03-05:/2019/03/05/end-of-year-device-check-in-app/</guid><category>Web Design and Development</category><category>php</category></item><item><title>Prom Tickets Web App</title><link>https://blog.ericturner.it/2019/03/05/prom-tickets-web-app/</link><description>&lt;p&gt;I work in a school district and one of my latest projects is to create a custom application for prom tickets. It features the ability to scan a student's ID and will verify the student against a list for eligibility and then automatically send out tickets to the students for …&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eric Turner</dc:creator><pubDate>Tue, 05 Mar 2019 16:50:41 -0500</pubDate><guid>tag:blog.ericturner.it,2019-03-05:/2019/03/05/prom-tickets-web-app/</guid><category>Web Design and Development</category><category>php</category></item></channel></rss>