Dockerizing Tor Bridge

A guide to setting up a Tor bridge using Docker containers, including reviewing the setup script for security and configuring the bridge to help users in censored regions access the open internet.

September 23, 2019 · 5 min · Spencer Koch

HouSecCon 2019 Talk

I gave a talk at HouSecCon 2019 about building an offensive security department from scratch at a global energy company. Includes slides and video recording of the presentation.

July 25, 2019 · 1 min · Spencer Koch

Practical Application of Keylogger for Incident Response

A walkthrough of evaluating and implementing different PowerShell keylogger options for an cyber investigation, including testing simple keyloggers, PowerSploit, Nishang, and customizing a solution based on Shima’s keylogger.

August 25, 2018 · 6 min · Spencer Koch

Shocker - Hack The Box writeup

Been a while since I did a blog post, but figured I’d jump on the bandwagon of Hack The Box writeups for retired boxes. Got the message that Valentine was being released on 2018-02-17 and retiring Shocker, which was a nice little box that I had managed to own user and system. So I thought I’d writeup my approach and observations. Run through a quick nmap, see what we’re working with. Since it’s an easy box, common ports should trigger something: ...

February 17, 2018 · 2 min · Spencer Koch

Practical Application of a Password Cracking Rig

Due to a string of events in a recent forensics investigation, our InfoSec department had ourselves an abandoned graphics design desktop with an NVIDIA Quadro K5000. With this windfall, I decided this was a good time to try out something I saw from the folks at shellntel, but with only 1 GPU instead of 8. Gotta start somewhere. Following their article, I learned a couple of things that I thought I’d share. ...

May 21, 2017 · 7 min · Spencer Koch