jon.glass jon.glass

jon.glass

Half Full of Security | Sharpening the ACKs since 2013Half Full of Security | Sharpening the ACKs since 2013

Half Full of Security Sharpening the ACKs since 2013Half Full of Security Sharpening the ACKs since 2013. Half Full of Security. Sharpening the ACKs since 2013. Use Python to Encrypt Memory Files. May 28, 2015. Read More →. My analysis of Dridex malware (Part Two). March 23, 2015. Read More →. My analysis of Dridex malware (Part One). March 20, 2015. I had a few unscripted hours to kill before bed so I snagged a Dridex sample from Malwr.com to see what all of the fuss was about. According to Thre...I out...

http://www.jon.glass/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR JON.GLASS

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

November

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.1 out of 5 with 9 reviews
5 star
6
4 star
0
3 star
2
2 star
0
1 star
1

Hey there! Start your review of jon.glass

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

1 seconds

FAVICON PREVIEW

  • jon.glass

    16x16

CONTACTS AT JON.GLASS

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Half Full of Security | Sharpening the ACKs since 2013Half Full of Security | Sharpening the ACKs since 2013 | jon.glass Reviews
<META>
DESCRIPTION
Half Full of Security Sharpening the ACKs since 2013Half Full of Security Sharpening the ACKs since 2013. Half Full of Security. Sharpening the ACKs since 2013. Use Python to Encrypt Memory Files. May 28, 2015. Read More →. My analysis of Dridex malware (Part Two). March 23, 2015. Read More →. My analysis of Dridex malware (Part One). March 20, 2015. I had a few unscripted hours to kill before bed so I snagged a Dridex sample from Malwr.com to see what all of the fuss was about. According to Thre...I out...
<META>
KEYWORDS
1 email
2 github
3 twitter
4 links
5 videos
6 middot;
7 uncategorized
8 leave a comment
9 dfir
10 next »
CONTENT
Page content here
KEYWORDS ON
PAGE
email,github,twitter,links,videos,middot;,uncategorized,leave a comment,dfir,next »,search for,recent posts,recent comments,jonathanglass@live com,kristinn,michael godfrey,archives,categories,hacking,wireless,meta,entries,wordpress org
SERVER
Apache/2.4.12
POWERED BY
PHP/5.4.43
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Half Full of Security | Sharpening the ACKs since 2013Half Full of Security | Sharpening the ACKs since 2013 | jon.glass Reviews

https://jon.glass

Half Full of Security Sharpening the ACKs since 2013Half Full of Security Sharpening the ACKs since 2013. Half Full of Security. Sharpening the ACKs since 2013. Use Python to Encrypt Memory Files. May 28, 2015. Read More →. My analysis of Dridex malware (Part Two). March 23, 2015. Read More →. My analysis of Dridex malware (Part One). March 20, 2015. I had a few unscripted hours to kill before bed so I snagged a Dridex sample from Malwr.com to see what all of the fuss was about. According to Thre...I out...

INTERNAL PAGES

jon.glass jon.glass
1

Jon – Half Full of Security

http://jon.glass/author/admin

Half Full of Security. Sharpening the ACKs since 2013. Dealing with Users Gone Bad…. We have all been there when someone that gets paid more than you do runs in and says “We need to remove User X from the network and lock them out of their PC to preserve evidence! 8221; If not, you will be. Aside from any 3rd party endpoint software you might have in that environment. 8230;what do you do? Disable User X’s Active Directory Account. Delete All Cached Credentials. Change their BitLocker Key Remotely. This i...

2

Uncategorized – Half Full of Security

http://jon.glass/category/uncategorized

Half Full of Security. Sharpening the ACKs since 2013. Dealing with Users Gone Bad…. We have all been there when someone that gets paid more than you do runs in and says “We need to remove User X from the network and lock them out of their PC to preserve evidence! 8221; If not, you will be. Aside from any 3rd party endpoint software you might have in that environment. 8230;what do you do? Disable User X’s Active Directory Account. Delete All Cached Credentials. Change their BitLocker Key Remotely. This i...

3

Half Full of Security – Page 4 – Sharpening the ACKs since 2013

http://jon.glass/page/4

Half Full of Security. Sharpening the ACKs since 2013. Q: Imaginary Reader writes “Sysmon is great and all but how can I quickly search for specific information from it? A: To be honest, Imaginary Reader, I was wondering the same thing. So I threw this together to perform a very common function: return the dates and times that a process was executed. I am looking for ways to speed this up so if anyone has any suggestions, let me know. September 25, 2014. Just at a quick glance, I see a few things in ther...

4

34 File Entries on a Brand New $MFT – Half Full of Security

http://jon.glass/34-file-entries-on-a-brand-new-mft

Half Full of Security. Sharpening the ACKs since 2013. 34 File Entries on a Brand New $MFT. So recently there was a request on a DFIR mailing list about recovering $MFT FILE records. That got me thinking about the creation of the $MFT so I added a new virtual drive to a VM and formatted it. Here are the entries I found on a brand new $MFT:. 8220;0”,”File”,”/$MFT”. The master file table (MFT) stores the information required to retrieve files from an NTFS partition. Http:/ ntfs.com/transaction.htm. 8220;Bo...

5

Links to Stuff I Found Useful/Interesting – Half Full of Security

http://jon.glass/shares-his-links

Half Full of Security. Sharpening the ACKs since 2013. Links to Stuff I Found Useful/Interesting. Http:/ ss64.com/ps/syntax-esc.html. Http:/ www.nirsoft.net/utils/browsing history view.html/. Http:/ www.hexacorn.com/blog/2012/07/23/beyond-good-ol-run-key/. Http:/ www.hexacorn.com/blog/2012/09/16/beyond-good-ol-run-key-part-2/. Http:/ www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/. Http:/ www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/. Http:/ www.hexacorn.com/blog...Http:...

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

travisaltman.com travisaltman.com

» Blog Archive » Metasploit set rhosts file

http://travisaltman.com/metasploit-set-rhosts-file

Laquo; Brute force MySQL with Nmap. IPhone: quick process to check for local files of interest. Metasploit set rhosts file. Just a quick tip I don’t see documented a bunch of places, when you want to feed metasploit a list of targets in a file you need to use the following syntax. Below is a screenshot for context. This entry was posted on Saturday, January 31st, 2015 at 7:14 am and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0. June 4th, 2016 at 7:15 pm.

travisaltman.com travisaltman.com

» Blog Archive » iPhone: quick process to check for local files of interest

http://travisaltman.com/iphone-quick-process-to-check-for-local-files-of-interest

Laquo; Metasploit set rhosts file. Defeating MDM: Enrolling a jailbroken device into a mobile device management system. IPhone: quick process to check for local files of interest. Plug iPhone or iPad into Mac. User iExplorer or iFunbox to explore file system of apps. Export relevant directories to local box (Usually Library and *.app). Search for files of interest. Search inside the files for items of interest. IExplorer can open plist in quick view. You can open databases with Sqlite browser.

travisaltman.com travisaltman.com

» Uncategorized

http://travisaltman.com/category/uncategorized

Archive for the ‘Uncategorized’ Category. Laquo; Older Entries. Encode your SQL injection attacks. Friday, October 30th, 2015. Encoding SQL injection attacks is nothing new and automated tools like SQLmap will more than likely find flaws via this method. That being said I was combing through some of my old docs and found what I think is a decent explanation how this type of attack leads to SQL injection. The other classic SQL injection string ‘ or 1=1 also gives us a 500 error, most of those classic ‘ or...

travisaltman.com travisaltman.com

» Blog Archive » Sqlmap – crawl and discover SQL injections

http://travisaltman.com/sqlmap-crawl-and-discover-sql-injections

Laquo; Burp extension environment for Python. Brute force MySQL with Nmap. Sqlmap – crawl and discover SQL injections. I use these command line switches to automate the process, I’ve had some good results. Python sqlmap.py -u http:/ example.com - forms - batch - crawl=10 - cookie=jsessionid=12345 - level=5 - risk=3. Forms = Parse and test forms. Batch = non interactive mode, usually Sqlmap will ask you questions, this accepts the default answers. Crawl = how deep you want to crawl a site.

travisaltman.com travisaltman.com

» Blog Archive » Defeating MDM: Enrolling a jailbroken device into a mobile device management system

http://travisaltman.com/defeating-mdm-enrolling-a-jailbroken-device-into-a-mobile-device-management-system

Laquo; iPhone: quick process to check for local files of interest. Encode your SQL injection attacks. Defeating MDM: Enrolling a jailbroken device into a mobile device management system. MDM or mobile device management. AFW) which looks to close the gap and add a lot of MDM capabilities which will greatly help organizations adopt the Android platform, especially in a BYOD. Environment. With that intro out of the way let’s get to how one can break MDM. This will focus on iOS. Enrolling a jailbroken de...

travisaltman.com travisaltman.com

» About

http://travisaltman.com/about

My name is Travis as you might have guessed from the domain name. Originally from Lake City, SC but currently residing in Richmond, VA. I work and teach in the info security field. The purpose of this site is to share my experiences and hopefully help others in the process. I love feedback so please feel free to contact me or post comments. With White as Milk. Designed by Azeem Azeez.

travisaltman.com travisaltman.com

» Blog Archive » Brute force MySQL with Nmap

http://travisaltman.com/brute-force-mysql-with-nmap

Laquo; Sqlmap – crawl and discover SQL injections. Metasploit set rhosts file. Brute force MySQL with Nmap. Just a quick one liner, you can also incorporate this into a huge sweep of the network which will hopefully identify MySQL databases with weak or default credentials. Nmap -p 3306 10.10.10.10 - script mysql-brute - script-args userdb=user.txt,passdb=pass.txt. This entry was posted on Wednesday, December 24th, 2014 at 3:14 am and is filed under Uncategorized. Mail (will not be published).

travisaltman.com travisaltman.com

» mobile

http://travisaltman.com/category/mobile

Archive for the ‘mobile’ Category. Defeating MDM: Enrolling a jailbroken device into a mobile device management system. Friday, May 1st, 2015. MDM or mobile device management. AFW) which looks to close the gap and add a lot of MDM capabilities which will greatly help organizations adopt the Android platform, especially in a BYOD. Environment. With that intro out of the way let’s get to how one can break MDM. This will focus on iOS. Enrolling a jailbroken device can very from quite simple to reversing...

UPGRADE TO PREMIUM TO VIEW 6 MORE

TOTAL LINKS TO THIS WEBSITE

14

SOCIAL ENGAGEMENT



OTHER SITES

jon.floridahomesearch.com jon.floridahomesearch.com

Central Florida Real Estate :: KELLER WILLIAMS CLASSIC III

You currently have no saved searches. KELLER WILLIAMS CLASSIC VI. Days on Site (Newest). Days on Site (Oldest). Photo gallery of properties. Google map, sidebar of properties. Large photo, sidebar of properties. Solutions for TODAY'S Real Estate Market. Find Your Central Florida Home! We specialize in Central Florida real estate. Welcome to FloridaHomeSearch.com. We love Central Florida! I invite you to put our pledge to the test. KELLER WILLIAMS CLASSIC VI. Top Areas & Neighborhoods. Mount Dora Sylvan S...

jon.format.com jon.format.com

J.R. Ball Photography - Americana

Americana, Vol. II.

jon.foster.li jon.foster.li

Bluehost.com

There is no website configured at this address. You are seeing this page because there is nothing configured for the site you have requested. If you think you are seeing this page in error, please contact the site administrator or datacenter responsible for this site. 2003-2009 BlueHost.Com. Toll Free (888) 401-HOST(4678).

jon.games-ignition.com jon.games-ignition.com

Jon's Portfolio

Jonathan Ong's Portfolio and Works. ONG JIT SHENG, JONATHAN. National University of Singapore. Diploma in Digital Entertainment Technology with merit. Obtained 8 distinctions in the GCE 'O' Level examinations. Interned as a game programmer at the Singapore-MIT GAMBIT Game Lab during the summer of 2011. Worked as a software developer at the localisation branch of Electronic Arts Asia Pacific in 2008. Worked as a Game Programmer at Nabi Studios from 2007 - 2008. View my full CV. Works of Jonathan Ong.

jon.gaynor.org jon.gaynor.org

HOW DID THIS GET HERE I DONT EVEN

Non-static method Pubwich: () should not be called statically in /home/jgaynor/public html/jon.gaynor.org/lib/Pubwich.php. Non-static method Pubwich: () should not be called statically in /home/jgaynor/public html/jon.gaynor.org/lib/Pubwich.php. Non-static method Pubwich: () should not be called statically, assuming $this from incompatible context in /home/jgaynor/public html/jon.gaynor.org/lib/Services/Service.php. Non-static method Pubwich: () should not be called statically in /home/jgaynor/public htm...

jon.glass jon.glass

Half Full of Security | Sharpening the ACKs since 2013Half Full of Security | Sharpening the ACKs since 2013

Half Full of Security Sharpening the ACKs since 2013Half Full of Security Sharpening the ACKs since 2013. Half Full of Security. Sharpening the ACKs since 2013. Use Python to Encrypt Memory Files. May 28, 2015. Read More →. My analysis of Dridex malware (Part Two). March 23, 2015. Read More →. My analysis of Dridex malware (Part One). March 20, 2015. I had a few unscripted hours to kill before bed so I snagged a Dridex sample from Malwr.com to see what all of the fuss was about. According to Thre...I out...

jon.gold jon.gold

Jon Gold - Designer & Technologist

Photo by Daniel Agee. Hey, I’m Jon. I work at The Grid. Teaching robots how to build beautiful websites. I became a lot happier in life when I stopped trying to decide whether to call myself a designer or developer, but I care equally about typography, functional programming, grid systems and algorithms I guess beauty, simplicity and elegance transcends medium. I'm not available to hire, but you can tweet me. Cat gifs, Buckminster Fuller quotes and jokes about immutable data structures.

jon.gr.jp jon.gr.jp

日本アウトドアネットワーク(JON) | アウトドア活動の専門家・指導者・事業者の情報交換ネットワークです

毎回、ミーティングでは、総会の開催とともに、会員同士や外部の方からの情報 … 続きを読む →. 関東近辺ならどこの里山にもあるので、色々な場所を教えてあげるの … 続きを読む →. 参加者は8名と少なかったものの、その分濃 … 続きを読む →. AM JON包括保険利用者研修 情報提供 ホールアース自然学校の歴史と … 続きを読む →. 第48回 JONミーティング及び定例総会 開催のご案内 一般の方は総会以外は会員の紹介があれば参加可能です 第48回JONミーティングを下記により開催します。 この冬は関東地方に大雪が2度も降り、大きな災害、交 … 続きを読む →. 2014年3月冬のJON Festa In妙高高原 15thjonfesta0122. キャンプの可能性 2 アウトドア活動への期待 心配されるこどものからだと心 前号でJON 日本アウトドアネットワーク の20周年記念シンポジウムの第2部を紹介させて貰ったので、今回は第1部の基調講演。 日本体 … 続きを読む →. アウトドアをキーワードとした活動をしている団体の主宰者た … 続きを読む →. Hellip; 続きを読む →.

jon.grossart.net jon.grossart.net

Jon Grossart

jon.hampton.k12.va.us jon.hampton.k12.va.us

Jones Magnet Middle School

Jones Magnet Middle School. Operating Hours / Bell Schedule. Jones Magnet Middle School. Operating Hours / Bell Schedule. Jones Magnet Middle School. Monday Aug. 31. 7th and 8th Grade Open House. Wed Sept. 2. Wwwhampton.k12.va.us.

jon.happyjoyfun.net jon.happyjoyfun.net

The Jon Stewart Resource

April 25, 2004. Added a few screen caps:. Posted on 1:44 PM by Cristina. March 6, 2004. Added screen caps from Richard Pryor: I Ain't Dead Yet. Has donated screen caps from two Trio specials: Uncensored Comedy :That's Not Funny. And Feeding the Beast: The 24-Hour News Revolution. Posted on 3:40 PM by Cristina. Can't afford the new issue of Entertainment Weekly featuring Jon? Don't worry, the JSR is here to make it all better! We've got hundreds of transcripts, tons of pictures, and lots more!