London, UK -  Cyber security professional specialising in detection and response, sporadically blogging about technology and life to scratch a writing itch from a previous life as a journalist

Recent blog posts

AWS: Deploying and connecting to a SQL database in the cloud
 -  My first Amazon Web Services (AWS) basics post covered the process of setting up a Virtual Private Cloud (VPC) and a Windows Server 2019 EC2 instance. This time we’re going to build on this simple setup by deploying a Amazon Aurora SQL database and ensuring we can access it from...
AWS: Deploying a virtual network and server in the cloud
 -  Having worked on serveral projects involving Amazon Web Services (AWS) recently, but always at arm’s length, I decided to get a bit more hands-on. At worst this would give me a more practical grounding in managing cloud instances, and at best it would give me a useful resource for future...
Cracking a password-protected ZIP file with fcrackzip
 -  I recently took part in a DFIR capture the flag with some colleagues. Participants were provided with a system disk image and asked to mount it and complete a number of challenges to discover various flags hidden within the data. Exercises like this are always both a lot of fun...
Network connections and packet crafting on the Linux command line
 -  The problem with taking leave during a pandemic is that there are very few places you can go that don’t present an unnecessary risk. For me at least, the thought of taking a plane abroad wasn’t appealing, and neither were the Tube journeys that would be necessary to go out...
Technicolor TG582n router: The missing event logging manual
 -  What started as curiosity has turned into something of a labour of love. Online information about the Technicolor TG582n router’s event logging capabilities is scarce, and scattered across a number of forums. I’ve used that information along with some analysis of my own to compile this - the missing event...
Welcome to a new website with a new philosophy
 -  You may have noticed that things have changed around here - I built a new website, following the ethos that it should be as clear, lightweight, and fast as possible while respecting visitors’ privacy by keeping outside scripts and tracking to a minimum. In this post I take you through...
Why virtual cyber security conferences should be the new normal
 -  It’s not just TV presenters who have been broadcasting from their homes during the COVID-19 lockdown. Cyber security conferences have also gone virtual, opening them up to attendees who would otherwise be unable to benefit. Information security conferences are usually few and far between, at least in the UK. In...
SANS FOR508: I’m now a GIAC Certified Forensic Analyst
 -  After two and a half years in incident response it was time for another SANS course – FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics – with a tough exam I squeezed in just before COVID-19 consigned us all to our homes. SANS doesn’t seem to stipulate anymore that...
Setting up Pi-hole to rein in an extremely noisy Samsung Smart TV
 -  A restless mind, a new feature, and a concerning news story had me worried about privacy over Christmas. Here’s how I installed Pi-hole on my home network to try to block requests from my Samsung Smart TV – and what the data it collected revealed… It was the night before...
Long-form – HTTPS and VPNs: How private is your internet browsing?
 -  Web browsing privacy is of increasing concern as people’s business and personal lives become ever more entwined with the internet. This essay examines various connection scenarios to establish how secure your data really is. Introduction After years of industry concern, web browsing privacy is finally becoming a matter of interest...

Thinking about

Digital journalism
Coincidentally, in the space of a week I encountered both Zach Seward's article about Quartz and Craig Mod's excellent podcasts with Tim Ferriss. Both evoked fond memories of my time in journalism and the buzz surrounding digital journalism and media in the 2010s

Interests

  • Cyber security
  • Tech
  • Python
  • PowerShell
  • JavaScript
  • F1
  • Reading
  • Writing
  • Psychology
  • Philosophy
  • Exercise
  • Running
  • Gaming
  • Football
  • Music
  • Guitar