PinnedDevon GriffithinKafkaesque SecurityUncovering The Hidden Secrets of Hiring in The Tech IndustryWhat they don’t tell you about hiring — how to save time and land your dream job tomorrow…Apr 31Apr 31
PinnedDevon GriffithinSystem WeaknessWriting a RAT: Remote Access TrojanWhat is a RAT (Remote Access Trojan)?Aug 9, 20233Aug 9, 20233
Devon GriffithThe PHP script itself is designed to create the websocket and keep it open until the attacker…If you check out the repository and access the specific file used for this lesson, the comments in the script explain how it opens the…Mar 3Mar 3
Devon GriffithinKafkaesque SecurityOut-of-Band (OOB) SQL Injection — Ingenious Data ExfiltrationThe Silent Extractor: OOB Techniques for Restricted Environments.Feb 23Feb 23
Devon GriffithinKafkaesque SecurityWelcoming Our New Writers!Welcome to Kafkaesque Security! We go by KafkaSec for short.Feb 111Feb 111
Devon GriffithinKafkaesque SecurityWhat Type of Malware is a Logic Bomb?If you want to be an expert on Cybersecurity, you need to understand this devious malware…Feb 4Feb 4
Devon GriffithinKafkaesque SecurityAn Impractical But Impenetrable Guide To CybersecurityThis guide will show you some of the most inspired, deranged, impractical, and effective ways to secure systems so you never have to worry…Feb 2Feb 2
Devon GriffithI Don’t Travel Because…People have reasons for staying in one place, and people have reasons for travelling…Feb 1Feb 1
Devon GriffithThat is a great quesstion, but also one that does not have a straightforward answer.The key aspect I would focus on in the name Remote Access Trojan, is obviously Remote. This malware is going to be attempting to either…Jan 30Jan 30