Dockerizing Tor Bridge

A guide to setting up a Tor bridge using Docker containers, including reviewing the setup script for security and configuring the bridge to help users in censored regions access the open internet.

September 23, 2019 · 5 min · Spencer Koch

Practical Application of Keylogger for Incident Response

A walkthrough of evaluating and implementing different PowerShell keylogger options for an cyber investigation, including testing simple keyloggers, PowerSploit, Nishang, and customizing a solution based on Shima’s keylogger.

August 25, 2018 · 6 min · Spencer Koch

Practical Application of a Password Cracking Rig

Due to a string of events in a recent forensics investigation, our InfoSec department had ourselves an abandoned graphics design desktop with an NVIDIA Quadro K5000. With this windfall, I decided this was a good time to try out something I saw from the folks at shellntel, but with only 1 GPU instead of 8. Gotta start somewhere. Following their article, I learned a couple of things that I thought I’d share. ...

May 21, 2017 · 7 min · Spencer Koch