
John Carroll
Threat Modeling ? Not My Cup of Tea...
Threat Modeling is not everyone's cup of tea, but let's threat model everyone's cup of tea.
Read more
Files, Folders & Fun (revisited)
Playing with folder resolution to build a better pretext
Read more
The Cost of Expiration
Who needs to know when a domain has expired ?
It Depends, and it Deepens.
Read more
File Folding.
File Folding is a technique that moves a file into hex, and that hex is broken into folder file names in a fashion that can be reconstructed.
Read more
Data-bouncing
Data-Bouncing - The art of indirect exfiltration. Using & Abusing Trusted Domains as a 2nd Order Transport.
Read more
Securing Ghost Blog Authentication with Cloudflare's ZeroTrust Access Policy
How to implement MFA in Ghost Blog with Cloudflare's Zerotrust Access Policy.
Read more