top of page
![](https://static.wixstatic.com/media/11062b_4d1ce144268d4ffda4eb0e5d39af01d0f000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_4d1ce144268d4ffda4eb0e5d39af01d0f000.jpg)
![](https://static.wixstatic.com/media/71d039_50826e26a05d4cbca96e71024e3fcab1~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/71d039_50826e26a05d4cbca96e71024e3fcab1~mv2.webp)
![Understanding and Defending Against CVE-2024-38063: A Critical IPv6 Vulnerability in Windows](https://static.wixstatic.com/media/71d039_50826e26a05d4cbca96e71024e3fcab1~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/71d039_50826e26a05d4cbca96e71024e3fcab1~mv2.webp)
Chris Coulombe
Sep 25, 20244 min read
Understanding and Defending Against CVE-2024-38063: A Critical IPv6 Vulnerability in Windows
Introduction CVE-2024-38063, a critical vulnerability in the Windows TCP/IP stack, has garnered significant attention in the...
45 views
![](https://static.wixstatic.com/media/71d039_b9fe7c55ec164ae8bd9fb54ad3137430~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/71d039_b9fe7c55ec164ae8bd9fb54ad3137430~mv2.webp)
![The Rise and Fall of the 911 S5 Botnet: A Case Study in Cybercrime](https://static.wixstatic.com/media/71d039_b9fe7c55ec164ae8bd9fb54ad3137430~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/71d039_b9fe7c55ec164ae8bd9fb54ad3137430~mv2.webp)
Chris Coulombe
Jun 2, 20243 min read
The Rise and Fall of the 911 S5 Botnet: A Case Study in Cybercrime
The recent dismantling of the 911 S5 botnet marks a significant victory in the ongoing battle against cybercrime. Operated by 36-year-old...
32 views0 comments
![](https://static.wixstatic.com/media/71d039_1b6574f85d8b455e836f49d083313774~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_1b6574f85d8b455e836f49d083313774~mv2.webp)
![The Psychology of Social Engineering: Why It Works and How to Protect Yourself](https://static.wixstatic.com/media/71d039_1b6574f85d8b455e836f49d083313774~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_1b6574f85d8b455e836f49d083313774~mv2.webp)
Chris Coulombe
May 23, 20246 min read
The Psychology of Social Engineering: Why It Works and How to Protect Yourself
Social engineering is a term that has gained significant traction in the cybersecurity world. It refers to the psychological manipulation...
39 views0 comments
![](https://static.wixstatic.com/media/71d039_ca708ed53568416dbada101442640551~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_ca708ed53568416dbada101442640551~mv2.webp)
![The Psychology of Being a Hacker: Understanding the Motivations Behind Cybercrime](https://static.wixstatic.com/media/71d039_ca708ed53568416dbada101442640551~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_ca708ed53568416dbada101442640551~mv2.webp)
Chris Coulombe
May 23, 20247 min read
The Psychology of Being a Hacker: Understanding the Motivations Behind Cybercrime
In the digital age, hacking has emerged as a complex and multifaceted phenomenon. From white hat hackers who strive to protect systems to...
62 views0 comments
![](https://static.wixstatic.com/media/71d039_1a1179e902ef4c3a9d55038a1d608844~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/71d039_1a1179e902ef4c3a9d55038a1d608844~mv2.webp)
![Harvard's Quantum Network: A New Era in Cybersecurity](https://static.wixstatic.com/media/71d039_1a1179e902ef4c3a9d55038a1d608844~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/71d039_1a1179e902ef4c3a9d55038a1d608844~mv2.webp)
Chris Coulombe
May 18, 20243 min read
Harvard's Quantum Network: A New Era in Cybersecurity
Physicists at Harvard University have achieved a groundbreaking milestone in cybersecurity by developing what they claim to be the...
12 views0 comments
![](https://static.wixstatic.com/media/71d039_314d8269a2e04479b0a9778560e1fa31~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_314d8269a2e04479b0a9778560e1fa31~mv2.webp)
![Exploring the Security Risks of Neuralink and Other Medical IoT Devices](https://static.wixstatic.com/media/71d039_314d8269a2e04479b0a9778560e1fa31~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_314d8269a2e04479b0a9778560e1fa31~mv2.webp)
Chris Coulombe
May 12, 20243 min read
Exploring the Security Risks of Neuralink and Other Medical IoT Devices
Neuralink, a brain-computer interface (BCI) startup founded by Elon Musk, has made significant advancements in neuroscience and...
21 views0 comments
![](https://static.wixstatic.com/media/71d039_c1c96f087df74a95888fb8fad157feb1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_c1c96f087df74a95888fb8fad157feb1~mv2.webp)
![Extensive Review of the Cyber Attack on Ascension Healthcare: Lessons and Proactive Measures](https://static.wixstatic.com/media/71d039_c1c96f087df74a95888fb8fad157feb1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_c1c96f087df74a95888fb8fad157feb1~mv2.webp)
Chris Coulombe
May 10, 20243 min read
Extensive Review of the Cyber Attack on Ascension Healthcare: Lessons and Proactive Measures
Introduction The recent cyber attack on Ascension Healthcare through its third-party vendor, ConsensioHealth, has cast a spotlight on the...
19 views0 comments
![](https://static.wixstatic.com/media/71d039_9529922e57ac45d691d49aa7005dd7e3~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/71d039_9529922e57ac45d691d49aa7005dd7e3~mv2.webp)
![The Dark Side of AI in Cybersecurity: Empowering Cybercriminals and Expanding Threat Landscapes](https://static.wixstatic.com/media/71d039_9529922e57ac45d691d49aa7005dd7e3~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/71d039_9529922e57ac45d691d49aa7005dd7e3~mv2.webp)
Chris Coulombe
May 9, 20243 min read
The Dark Side of AI in Cybersecurity: Empowering Cybercriminals and Expanding Threat Landscapes
The rapid advancements in Artificial Intelligence (AI) have heralded new frontiers in cybersecurity, promising enhanced protective...
19 views0 comments
![](https://static.wixstatic.com/media/71d039_3ec201bc83e449beb05f40237f760088~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_3ec201bc83e449beb05f40237f760088~mv2.webp)
![Disruption of LockBit Ransomware: A Turning Point or a Temporary Setback?](https://static.wixstatic.com/media/71d039_3ec201bc83e449beb05f40237f760088~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_3ec201bc83e449beb05f40237f760088~mv2.webp)
Chris Coulombe
May 8, 20243 min read
Disruption of LockBit Ransomware: A Turning Point or a Temporary Setback?
The recent disruption of LockBit, one of the most prolific ransomware groups globally, marks a significant moment in the ongoing battle...
12 views0 comments
![](https://static.wixstatic.com/media/71d039_f921b3cc04a24037a045ad77e8d05da0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_f921b3cc04a24037a045ad77e8d05da0~mv2.webp)
![Analyzing CVE-2024-23897: A Critical Vulnerability in Jenkins](https://static.wixstatic.com/media/71d039_f921b3cc04a24037a045ad77e8d05da0~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_f921b3cc04a24037a045ad77e8d05da0~mv2.webp)
Chris Coulombe
May 6, 20243 min read
Analyzing CVE-2024-23897: A Critical Vulnerability in Jenkins
CVE-2024-23897 represents a significant security threat within Jenkins, an open-source automation server integral to continuous...
30 views0 comments
![](https://static.wixstatic.com/media/71d039_5f527e454386438fa2660a0c42e40c29~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_5f527e454386438fa2660a0c42e40c29~mv2.webp)
![CVE-2024-3400: An In-Depth Analysis from the Front Lines of Cybersecurity](https://static.wixstatic.com/media/71d039_5f527e454386438fa2660a0c42e40c29~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_5f527e454386438fa2660a0c42e40c29~mv2.webp)
Chris Coulombe
May 4, 20243 min read
CVE-2024-3400: An In-Depth Analysis from the Front Lines of Cybersecurity
The discovery and subsequent exploitation of CVE-2024-3400, a critical vulnerability in Palo Alto Networks’ PAN-OS operating system,...
31 views0 comments
![](https://static.wixstatic.com/media/71d039_68e53f9b1077406eadfb5e9582603454f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_68e53f9b1077406eadfb5e9582603454f000.webp)
![Physical Pentesting OMG Cable](https://static.wixstatic.com/media/71d039_68e53f9b1077406eadfb5e9582603454f000.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_68e53f9b1077406eadfb5e9582603454f000.webp)
Chris Coulombe
Nov 7, 20221 min read
Physical Pentesting OMG Cable
In the following video I demonstrate the use of an OMG cable deploying the hoax shell PowerShell Payload. References:...
29 views0 comments
![](https://static.wixstatic.com/media/71d039_45e8a57e6cb5484b9a5b738e40954902f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_45e8a57e6cb5484b9a5b738e40954902f000.webp)
![Physical Pentesting with USB/OMG plug](https://static.wixstatic.com/media/71d039_45e8a57e6cb5484b9a5b738e40954902f000.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_45e8a57e6cb5484b9a5b738e40954902f000.webp)
Chris Coulombe
Nov 7, 20221 min read
Physical Pentesting with USB/OMG plug
I thought it would be interesting to deploy the hoax shell PowerShell payload via the omg cable. In the following video this is exactly...
25 views0 comments
![](https://static.wixstatic.com/media/71d039_f18790dda9194448879923c1d9f85599f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_f18790dda9194448879923c1d9f85599f000.webp)
![o365 Business Premium account MFA bypass](https://static.wixstatic.com/media/71d039_f18790dda9194448879923c1d9f85599f000.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_f18790dda9194448879923c1d9f85599f000.webp)
Chris Coulombe
Nov 3, 20221 min read
o365 Business Premium account MFA bypass
I setup a Debian 10 server on Linode to host Evilginx where I was able to successfully initiate a man-in-the-middle attack to steal the...
80 views0 comments
![](https://static.wixstatic.com/media/71d039_1a7b2d350a4c4b7eb5effb41d084fc90f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/71d039_1a7b2d350a4c4b7eb5effb41d084fc90f000.webp)
![Token Impersonation From Nessus Credentialed Scan](https://static.wixstatic.com/media/71d039_1a7b2d350a4c4b7eb5effb41d084fc90f000.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/71d039_1a7b2d350a4c4b7eb5effb41d084fc90f000.webp)
Chris Coulombe
Nov 3, 20221 min read
Token Impersonation From Nessus Credentialed Scan
In the above video I demonstrate how I'm able to get domain admin from token impersonation of a credentialed Nessus scan. I start by...
41 views0 comments
bottom of page