Josiah

/Josiah Pierce

About Josiah Pierce

Josiah enjoys competing in Capture the Flag (CTF) competitions in his spare time and is interested in exploit development and reverse engineering.

Using Iodine for DNS Tunneling C2 to Bypass Egress Filtering

Using Iodine for DNS Tunneling C2 to Bypass Egress Filtering   Intro Security-conscious organizations will often restrict the types of traffic allowed out of their networks. Protocols or ports deemed unnecessary for the majority of the organization’s users will simply be blocked, with whitelists established for the few users who may have a business need [...]

By |2019-08-12T18:15:45+00:00August 12th, 2019|Categories: InfoSec, IT Security News|0 Comments

Basic ROP Techniques and Tricks

Basic ROP Techniques and Tricks Intro During assessments, we’ll occasionally run across custom binaries. Since most modern binaries include mitigations such as a non-executable stack (NX) and run on systems employing Address Space Layout Randomization (ASLR), knowledge of modern exploit development techniques that can defeat mitigations is useful in evaluating the security of these binaries. [...]

By |2019-07-18T21:39:58+00:00July 18th, 2019|Categories: InfoSec|0 Comments