Network Forensics

RIP Office365 Magic Unicorn Tool

By |2019-01-08T14:11:59-06:00July 6th, 2018|

As of this morning, Microsoft appears to have killed access to the "Activities" API, first publicized by Anonymous and used as [...]

Manually Exploiting MS17-010

By |2019-01-08T15:50:37-06:00February 20th, 2018|

The MS17-010 (EternalBlue, EternalRomance, EternalChampion and EternalSynergy) exploits, which target Microsoft Windows Server Message Block (SMB) version 1 flaws, were believed [...]

Subnetting != Segmentation

By |2019-01-09T15:34:28-06:00August 29th, 2017|

Here at LMG Security, we do a lot of pentesting. I have performed penetration tests on organizations of all sizes, including [...]

Cyber Slap Bracelets are Here!

By |2019-01-16T23:16:04-06:00July 27th, 2017|

Check out LMG's sweet new Cybersecurity Slap bracelets: the TCP/IP protocol chart (red/yellow), Emacs/Vi reference (green), Command Line "Rosetta Stone" (orange), and Cybersecurity Cheat Sheet (pink). We're giving out a limited number at Black Hat and DEFCON. Want one? Just ask an LMG team member!

Antivirus Evasion

By |2019-01-09T15:53:02-06:00July 18th, 2017|

A common mistake made during internal penetration tests is getting tripped up by basic antivirus software. During the privilege escalation phase [...]

How to Enable and Start SSH on Kali Linux

By |2019-01-09T11:34:12-06:00May 18th, 2017|

Here at LMG Security, we're passionate about providing excellent cybersecurity services to organizations around the world. We're also passionate about increasing [...]