Greetings,
My name is Gareth Rouse, I’m a information security professional. I was raised in Silicon Valley and for the last 16 years have lived and worked in the United Kingdom.
My aim is to create a space that accurately reflects my knowledge, ideas and personality – a site that I can share with others instead of a Twitter or Instagram handle.
What I Do
- Analytics
- Write-ups of security tools
- Cloud security guides
- Security automation guides
- Documenting my home labbing experience
Projects
- Grouse-Dictation - A voice-to-text tool I develop, and use every day even to write this sentence.
- Sifter - A domain/IP fast-lookup tool written in Go – provides stylised terminal outputs for at a glance analysis.
Reading
A daily constant in my life that I consider invaluable – reading. I believe that knowledge is compounding, and even though you will not remember every book you’ve read or every idea you’ve encountered, exposing yourself to these perspectives – for reasons beyond me, lead you to be a well-rounded individual.
I’ve switched to the Hugo Diary theme for a cleaner, more focused site. WordPress was becoming too bloated and difficult to maintain. I was never fully happy with the styling I had for it. I also wanted a blog that natively supported Markdown, So I could automate it with my knowledge base. As a plus, Hugo is written in Golang, one of my favourite languages – It’s the perfect front-end site for back-end devs.
Comprehensive analysis of LATRODECTUS malware infection, examining the network traffic patterns, backdoor connections, and keyhole VNC activity through detailed PCAP investigation.
Key Topics:
- LATRODECTUS malware analysis
- Backdoor connection analysis
- Keyhole VNC traffic
- Network infection indicators
- IOC identification
Exploring how ChatGPT’s DataAnalyst feature can be leveraged to analyze network packet captures and generate comprehensive incident reports for cybersecurity investigations.
Key Topics:
- PCAP analysis using AI tools
- Malware traffic analysis
Deep dive into network packet analysis with Pizza-Bender challenge, examining malicious traffic patterns and identifying indicators of compromise through systematic PCAP investigation.
Key Topics:
- Network traffic analysis
- Malware identification
- PCAP forensics
- Traffic pattern recognition
Introduction to intrigue.io, an exceptional threat mapping and reconnaissance tool for cybersecurity professionals, covering its capabilities and practical applications in security assessments.
Key Topics:
- Threat mapping techniques
- OSINT gathering
- Reconnaissance automation
- Security assessment tools
- Intelligence collection
This guide is focused on getting Kansa up and running in an enterprise environment. PowerShell has a few safeguards you have to remove before it will let you run with the privileges you require.
What is Kansa?
Kansa is an Incident Response Framework that runs in PowerShell. Its primary purpose is to pull logs from multiple Windows machines that are running the same AD domain.
Resources: