A Scratch-Built Drill Press Vise from Scrap

Never underestimate the importance of fixturing when you’re machining parts. No matter what the material, firmly locking it down is the key to good results, and may be the difference between a pleasant afternoon in the shop and a day in the Emergency Room. Flying parts and shattered tooling are no joke, but a lot of times quality commercial solutions are expensive and, well, commercial.  So this scratch-built drill press vise is something the thrifty metalworker may want to consider.

To be sure, [Ollari’s] vise, made as it is almost completely from scrap angle iron, is no substitute for a …read more

Continue reading A Scratch-Built Drill Press Vise from Scrap

Black Hat & DEF CON 2018 – Tradecraft Security Weekly #28

This is the Hacker Summer Camp 2018 edition of Tradecraft Security Weekly. In this week’s episode Beau Bullock (@dafthack) talks about some of the more interesting items he saw come out of the Black Hat and DEF CON conferences this year. Links: Z… Continue reading Black Hat & DEF CON 2018 – Tradecraft Security Weekly #28

Restoring A 100 Year Old Vice To Pristine Condtion

We love our vices. They hold pipes for us to saw away at, wood while we carve, and circuit boards so that we can solder on components. So we keep them in shape by cleaning and greasing them every now and then, [MakeEverything] went even further. He found a 100-year-old vice that was in very rough shape and which was going to be thrown out and did a beautiful restoration job on it.

It was actually worse than in rough shape. At some point, one of the jaws had been replaced by welding on a piece of rebar where the …read more

Continue reading Restoring A 100 Year Old Vice To Pristine Condtion

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about a new collection of scripts, and a lab VM for hacking containers. Both of these re… Continue reading Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

Remote Authentication GeoFeasibility Tool – GeoLogonalyzer

Users have long needed to access important resources such as virtual
private networks (VPNs), web applications, and mail servers from
anywhere in the world at any time. While the ability to access
resources from anywhere is imperative for employe… Continue reading Remote Authentication GeoFeasibility Tool – GeoLogonalyzer

Trisis masterminds have hacked U.S. industrial firms, new research claims

A group known for infecting a Saudi petrochemical plant with highly sophisticated industrial control malware has targeted the same type of systems inside the United States, according to new research by ICS-focused cybersecurity startup Dragos. The group behind the malware, which Dragos refers to as “Xenotime,” has expanded their operations to include attacks on multiple undisclosed U.S. companies. The malware shows similarities to what’s commonly known as Trisis, which was used in an attack last year in Saudi Arabia. While Trisis exploited one particular industrial control system, researchers say a new variant impacts a variety of safety instrumented systems. Safety instrumented systems, or SIS for short, are hardware and software controls that protect large-scale industrial processes and equipment typically found in nuclear, petrochemical or manufacturing plants. There are few companies who create and manage SIS systems, including but not limited to St. Louis-based Emerson, New Jersey-based Honeywell, and Tokyo-based Yokogawa. Dragos has […]

The post Trisis masterminds have hacked U.S. industrial firms, new research claims appeared first on Cyberscoop.

Continue reading Trisis masterminds have hacked U.S. industrial firms, new research claims

Shining a Light on OAuth Abuse with PwnAuth

Introduction
Spear phishing attacks are seen as one of the biggest cyber threats
to an organization. It only takes one employee to enter their
credentials or run some malware for an entire organization to become
compromised. As such, companies de… Continue reading Shining a Light on OAuth Abuse with PwnAuth