John Pierce

. CISSP, SLAE, Security+

Welcome!

Welcome to my new site.  It's my first stab at creating an interactive website and has been quite a learning experience.

The odd looking character at the top left of the screen is a photo of the logo I carved for my furniture and carving business.  He's about 10" tall, 2" deep, and is carved from basswood.  I'll be adding galleries of some of my carvings as well as photos of architectural details that I've taken during my travels.  There is also a gallery devoted to the memory and skill of a dear friend of mine, Pascal Boissonet, who passed away in April, 2012.  I believe he was unique in crafting embossed organ pipe from pouring the tin through completed pipe.  I was lucky enough to spend a day with him while he made one and am sharing some of the photos.

I'm getting pretty close to having at least the foundation for the site.  There are a few public photo galleries, some articles, and videos.  If you want to comment, just register at the link to the top right of this page. 

I'm still developing/changing the structure as I learn more about css, php, html and the Drupal CMS.  For that reason, some things are a bit wonky.  I appreciate your patience, and if anything just completely fails, feel free to use the "Contact Me" form under "About Me" on the main menu.

I hope you enjoy.

 

Most Recent Articles

First bit::

Installation of the software to make a yubikey 4 work in FIDO U2F mode on Debian Jessie i386

First bit::

Lesson(s) learned

First bit::

This one stumped me. Overall, it was a great competition for me as I got to learn a whole lot of new things. I had never worked on a Mac, other than as a user, had never used Hopper, lldb or any of the other tools for reversing on a Mac, and haven't got any experience in the Objective C/Swift framework.

First bit::

4 rounds, lots of debugging

First bit::

Maybe should have come with a warning!

Videos

Categories: Network security, Videos
First bit::

Explains the workings of a DMZ, walks through setting up and testing of a DMZ in a virtual machine lab environment

Categories: Network security, Videos
First bit::

In this video I go through the process of setting up an SSH tunnel to hide an IP and also setting

Categories: Exploits, Videos
First bit::

Useful for someone who is interested in what a buffer overflow is. Does not go into the details of development, just explains generally and demonstrates the use of one.

Categories: Exploits, Videos
First bit::

a demonstration of a vulnerability discovered and published by Muts in 2004, exploited on a Windows XP SP3 machine using Python, Immunity Debugger, and Metasploit.

Categories: Network security, Videos
First bit::

In this video I demo some simple iptables rules and show them how to perform network traffic analysis to test them out.