The Moron Contract

We build networks in very specific ways for a lot of reasons. Proper resource utilization, security, segmentation, etc. Every network should have a demilitarized zone (DMZ) where web applications can create sockets to internal servers. It allows traffic to take a stop and be further inspected before allowing it to reach core or sensitive infrastructure […]

Read More The Moron Contract

DNS: The Internet’s Phone Book

There have been a few articles recently about Secure DNS or DNS over TLS, and the first question that a buddy asked me (@Pratik) was “what the hell is DNS, technology has too many acronyms”. Have no fear my friend, I’ve got your back. DNS, or Domain Name Service, is like a phone book. If […]

Read More DNS: The Internet’s Phone Book

Sandbox Evasion Technique

It’s been a while since I’ve written anything on my blog, its been a busy few months at GDT. We’ve been working on developing some cool new security technologies and techniques, and a new type of attack that leverages steganography and DNS exfiltration. I’ll have a write up on that as soon as I get […]

Read More Sandbox Evasion Technique