SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Learning Linux Systems Hardening Techniques through a Moonraker-themed CTF

Learning Linux Systems Hardening Techniques through a Moonraker-themed CTF

by Jay Beale

In Episode 007 of my Linux Attack and Defense series, I attack a James Bond-themed, intentionally-vulnerable capture the flag (CTF) system created by “creosote.” Playing this CTF, I chain together attacks. While many of the steps are focused on discovering or guessing passwords, there are two vital actions in the attack that aren’t. Learn more..

read more
Why Zero Trust is an Unrealistic Security Model

Why Zero Trust is an Unrealistic Security Model

By Morey Haber By definition, a zero trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user...

read more