Kleared4 closed-operation fly-away edge kit

By |2021-06-07T10:44:36-04:00June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|

We have started integrating closed-operation fly-away edge appliances with Kleared4, our disassociated cyber-operations, and proofing environment. #PCOE #PCTE #CyberRange Unlike other fly-away kits, this one is designed to operate completely closed! This model uses a Pelican 1200 case with a small Linux based PC. We recently used the device during a remote assessment on the other [...]

Comments Off on Kleared4 closed-operation fly-away edge kit

CompSec Direct wins firmware analysis prototype event held at Dreamport

By |2021-04-08T14:08:42-04:00June 8th, 2020|Categories: Automation, Cyber, Reports|Tags: , , , |

After placing 5th on a previous challenge, we were happy to place 1st on a subsequent firmware challenge. We improved our process, provided analysis and emulation findings to set us apart from the rest. Please visit https://dreamport.tech/events/event-rpe-the-broken-gear-in-the-watch-02.php for more information on the technical aspects of this challenge.

Comments Off on CompSec Direct wins firmware analysis prototype event held at Dreamport

Data Mining PDF documents; using data conversion to reduce analysis time

By |2019-08-15T13:19:40-04:00May 31st, 2017|Categories: Automation, e-Discovery, Forensic, Scripts, Tesseract|Tags: , , , , , |

Problem A month ago, we became aware of a way to harvest legal notifications from a government web-site. Link Here The web-server allows simple requests to be crafted in order to download PDF documents related to court proceedings. After a few hours, we had over 25,000 PDF documents available to analyze. Now the question becomes: What [...]

Comments Off on Data Mining PDF documents; using data conversion to reduce analysis time
Go to Top