Home

The Jester's Castle Episode 2

Hello Friends! Today we’re gonna talk about the supply chain, and more specifically supply chain attacks. The software supply chain is vulnerable, and every vendor is vulnerable so everyone must do their due diligence. The supply chain is such a hard element to secure because it spreads cross company which means when choosing who you work w...

Read more

The Jester's Castle Episode 1

Hello Friends! I’ve been debating doing this. I’ve trashed the transcript multiple times and remade it another several. I think that just goes to show how hard it is starting out when producing content. I’ve always had the most respect for my video production friends, but now I respect y’all on a whole other level. I’ve been working on this...

Read more

SANS Holiday Hack Challenge 2020 Write-Up Part 2/2

Hey Everyone! Glad You're Still Here Cracking At The SANS Holiday Hack Challenge AKA KRINGLE CON 3 (2020)! If y’all missed part one you can just reverse reverse! Clicking here : https://www.jameskainth.com/cyber/2021/01/11/HolidayHackChallenge2020.html At this point we’re 2 almost 3 Christmas trees in, so the challenges aren’t necessarily craz...

Read more

SANS Holiday Hack Challenge 2020 Write-Up Part 1/2

Hey Everyone! Today I wanted to go over the latest SANS Holiday Hack Challenge AKA KRINGLE CON 3 (2020)! So fair warning, I wasn’t able to complete the whole challenge but I did get a lot further than I initially thought I would and that’s why I’m feeling groovy enough to publish this 😜. So let’s dig in and recap what was a super fun event and ...

Read more

Graduating & Starting Work During The COVID-19 Global Pandemic

Disclaimer: I must inform readers that the views, thoughts, and opinions expressed in this text belong solely to me James Kainth, and not necessarily to my employer, organization, committee or any other group or individual. Lol Yes, That is New. Look at me I’m cool I get to put that disclaimer on some of my posts now 😉 Did I necessarily need to...

Read more

Let's Talk: ZAT

What Is ZAT? The Full Code Can Be Found Here: https://github.com/SuperCowPowers/zat/blob/master/examples/anomaly_detection.py Full credit to SuperCowPowers and the team there. They’re a very cool group that’s flying under the radar of many. I’m gonna showcase some excerpts of their code for those who are unfamiliar and would like to know wh...

Read more

Let's Talk: IDS(Intrusion Detection Systems)

Hi Everyone! This is the first post I’ve been making in relation to my capstone! My capstone utilizes Zeek logs partnered with some python tools that leverage machine learning algorithms for anomaly detection and also visualizations! Today, let’s talk about Zeek! Well, what’s Zeek? Zeek, is actually the world’s leading network security monitori...

Read more

Let's Talk: Ubuntu 20 ‐ WireGuard Kernel Protocol

Howdy folks! If you’ve read some of my latest blog posts, you’ll notice that I’ve been hopping over to the updated versions of my virtual machines latest operating systems, respectively. Last Ubuntu machine I used was Ubuntu 19, but to my surprise a mere three days later Ubuntu 20 was released! Focal Fossa as it is aptly named! There’s a lot o...

Read more