Brett Lischalk
  • Why GitLab Container Scan Results Might Not Match Trivy

    Sometimes you may see different vulnerabilities when Trivy is run locally vs when GitLab container scan runs. Here are some reasons why.

    October 19, 2023 - 4 minute read -
    gitlab vulnerability management trivy container scanning
  • Zero Downtime API Shared Secret Rotation

    A demonstration of how an API could rotate its shared secret with zero down time

    April 29, 2023 - 15 minute read -
    secret rotation zero down time shared secret
  • Lets Build A CI Pipeline Threat Model

    Lets build a threat model of a CI pipeline for fun

    April 24, 2021 - 7 minute read -
    threat modeling CI Pipeline container registry
  • Switching to Windows Part 1

    Taking the plunge on a Windows based laptop after years using OS X and Linux based devices

    April 5, 2021 - 5 minute read -
    windows linux mac wsl virtualization docker
  • Build A Web Site/App Quick and Cheap!

    Cheapest and fastest ways to get your project online

    December 19, 2020 - 5 minute read -
    thrifty cheap fast webapp php ruby static site generator gitlab github
  • Amazon ECR Image Scanning Gotchas

    Things you should know about the "vulnerabilities" ECR image scan results report

    December 1, 2020 - 3 minute read -
    docker aws ecr clair vulnerabilities compliance scanning
  • Practical Malware Analysis: Lab 3-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-3 malware.

    June 27, 2018 - 2 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-2 malware.

    December 31, 2017 - 5 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-1 malware.

    September 20, 2017 - 5 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Network Decryption

    In the first blog post about the Kankun smartplug, the Android application was decompiled and the AES-256 bit encryption key was found. In this blog post, the network traffic between the mobile app and smartphone will be captured, the network traffic will be decrypted utilizing a script from Payatu and the encryption key found previously, and the Kankun Smartplug will be controlled via the Kankun Controller Script from 0x00string

    September 15, 2017 - 9 minute read -
    analysis kankun decryption
  • Practical Malware Analysis: Lab 1-4

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-4 malware.

    August 28, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-3 malware.

    August 27, 2017 - 3 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-2 malware.

    August 24, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-1 malware.

    August 24, 2017 - 4 minute read -
    malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Analysis

    During the Offensive Internet Of Things course, the Kankun Smart Plug is analyzed in various ways including: using Jadx to decompile and analyze the mobile app, acquiring and analyzing the device's firmware, and a nalyzing the network traffic.

    August 14, 2017 - 6 minute read -
    firmware analysis kankun android
  • Asus RT-N15U Firmware Analysis

    For the next firmware analysis task of the Offensive Internet Of Things Exploitation final project, I decided to analyze the Asus RT-N15U firmware version 3.0.0.4.376.3754. The following is the process I used to backdoor, emulate, and analyze this firmware as well as any security issues I could find.

    July 20, 2017 - 9 minute read -
    firmware asus reverse-engineering
  • TP-Link TL-WR810N Firmware Analysis

    For one of the projects for the Offensive Internet Of Things Exploitation final exam I decided to try to analyze the firmware for the TP-Link TL-WR810N

    July 5, 2017 - 7 minute read -
    firmware analysis tp-link
  • Nand Glitching Wink Hub For Root

    During the Offensive Internet Of Things Exploitation course the instructor demonstrates a technique called a "NAND Glitch" on a Wink Connected Home Hub IoT device. This technique allows a root shell to be acquired on a device which normally does not provide console access. This post outlines the process I used to replicate the NAND Glitch as well as discusses some of the "gotchas" that I encountered along the way.

    July 5, 2017 - 6 minute read -
    nand-glitch wink-hub root uart
  • Mounting Virtualbox Shared Folder in Manjaro Guest

    Everytime I setup a Linux vm in Virtualbox and attempt to get shared folders working, I always run into issues. I decided to create a blog post to save my self the trouble of Googling so that I have the information in one place. In the various distros I have encountered issues with, Manjaro being the most recent, the issues have seemed to have been addressed by three things.

    May 11, 2017 - 2 minute read -
    manjaro virtualbox
  • Haskell YAML Config

    A quick example of reading a yaml config file in Haskell.

    February 5, 2017 - 3 minute read -
    haskell yaml config
  • Haskell TCP Fuzzer

    An example TCP fuzzer written in Haskell

    February 5, 2017 - 5 minute read -
    haskell fuzzer
  • Linux Daemon

    How to write a Linux daemon.

    January 17, 2017 - 6 minute read -
    c daemon linux
  • Opcode Script

    Opcodes from Assembly Instructions

    January 15, 2017 - 1 minute read -
    asm opcodes
  • SLAE Problem 7: Create a Custom Crypter

    SLAE Problem 7: Create a Custom Crypter

    January 10, 2017 - 10 minute read -
    asm shellcode crypter
  • SLAE Problem 6: Shell-Storm.com Shellcode Analysis and Polymorphic Modification

    SLAE Problem 6: Shell-Storm.com Shellcode Analysis and Polymorphic Modification

    January 9, 2017 - 17 minute read -
    asm shellcode polymorphic
  • Older posts
Tweets by @blischalk

Site content by: Brett Lischalk.