<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>JO's USB</title><link>https://josusb.com/</link><description>Recent content on JO's USB</description><generator>Hugo -- gohugo.io</generator><copyright>Copyright © 2021-2024 JO. All Rights Reserved.</copyright><lastBuildDate>Sat, 08 Jun 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://josusb.com/index.xml" rel="self" type="application/rss+xml"/><item><title>CTF Guide: Malbuster</title><link>https://josusb.com/blog/ctf-malbuster/</link><pubDate>Sat, 08 Jun 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-malbuster/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the
&lt;a href="https://tryhackme.com/module/malware-analysis" target="_blank" rel="noopener noreferrer">Malware Analysis&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a> module on THM.
In this scenario, you are tasked to analyze unknown malware samples detected
by your Security Operations team.&lt;/p></description></item><item><title>CTF Guide: Benign</title><link>https://josusb.com/blog/ctf-benign/</link><pubDate>Sat, 25 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-benign/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the &lt;a href="https://tryhackme.com/path/outline/soclevel1" target="_blank" rel="noopener noreferrer">SOC Level 1&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a>
learning path on TryHackMe. You are tasked to investigate a compromised
corporate system using limited Splunk logs.&lt;/p></description></item><item><title>CTF Guide: Snort Challenge - Live Attacks</title><link>https://josusb.com/blog/ctf-snort-challenge/</link><pubDate>Fri, 24 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-snort-challenge/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the &lt;a href="https://tryhackme.com/path/outline/soclevel1" target="_blank" rel="noopener noreferrer">SOC Level 1&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a>
learning path on TryHackMe. It simulates active network breaches on a system,
and you are tasked with detecting and remediating the breaches with Snort.&lt;/p></description></item><item><title>CTF Guide: Hunt Me II - Typo Squatters</title><link>https://josusb.com/blog/ctf-huntme-ii/</link><pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-huntme-ii/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is the final challenge of the
&lt;a href="https://tryhackme.com/module/threat-hunting" target="_blank" rel="noopener noreferrer">Threat Hunting&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a> module on THM. It follows-up right after Hunt Me I,
but the questions guide the investigation much less than before.&lt;/p></description></item><item><title>CTF Guide: Hunt Me I - Payment Collectors</title><link>https://josusb.com/blog/ctf-huntme-i/</link><pubDate>Fri, 10 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-huntme-i/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is a threat-hunting practice scenario.
We&amp;rsquo;ll have to investigate malicious activity on a computer that&amp;rsquo;s been the
victim of a phishing attack, from initial access all the way to stealing
confidential data.&lt;/p></description></item><item><title>3D Art Showcase II</title><link>https://josusb.com/portfolio/3d-2/</link><pubDate>Fri, 03 May 2024 15:37:33 -0400</pubDate><guid>https://josusb.com/portfolio/3d-2/</guid><description>&lt;p>More 3D art! All of these were made within the last year.
I&amp;rsquo;ve been pretty busy since the winter, so I haven&amp;rsquo;t
been able to do as much 3D art as I&amp;rsquo;d wish.&lt;/p></description></item><item><title>3D Art Showcase</title><link>https://josusb.com/portfolio/3d/</link><pubDate>Sun, 09 Jul 2023 15:37:33 -0400</pubDate><guid>https://josusb.com/portfolio/3d/</guid><description>&lt;p>I create fully animated 3D art compositions as a hobby, mainly of
photorealistic environments or abstract geometric pieces.
Here are some of the things I&amp;rsquo;ve worked on in the past year.&lt;/p></description></item><item><title>How To: Sort a List of Terraform Objects by Attribute</title><link>https://josusb.com/blog/terraform-sort/</link><pubDate>Thu, 20 Oct 2022 15:45:42 -0400</pubDate><guid>https://josusb.com/blog/terraform-sort/</guid><description>&lt;p>This is a short tutorial on how to sort a list of Terraform objects by a
specific attribute, which isn&amp;rsquo;t built-in to Terraform. This example will
sort AWS VPC subnets based on their amount of available IP addresses.&lt;/p></description></item><item><title>How To: Set Up an Apache Proxy Cache for Artifactory</title><link>https://josusb.com/blog/setup-proxy-cache/</link><pubDate>Fri, 02 Sep 2022 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/setup-proxy-cache/</guid><description>&lt;p>This is a tutorial on how to set up an Apache
&lt;span class="dictionary" data-text="A reverse proxy is a server placed in front of an origin server, and acts as a gateway between clients and the origin. Common uses for reverse proxies include load balancing, caching content, and additional layers of web security.">reverse proxy&lt;/span>
for
&lt;span class="dictionary" data-text="A cache sits between the client and an origin server, and copies the origin&amp;rsquo;s content. If the client requests data that&amp;rsquo;s been stored in the cache (&amp;ldquo;cached content&amp;rdquo;), it can retrieve the data directly without contacting the origin, improving performance.">caching content&lt;/span>
from JFrog Artifactory. I had to learn how to do
this for work to lessen the request load on the origin Artifactory server, and improve performance
overall.&lt;/p></description></item><item><title>About</title><link>https://josusb.com/about/</link><pubDate>Tue, 30 Aug 2022 00:00:00 +0000</pubDate><guid>https://josusb.com/about/</guid><description>Summary
Greetings! I&amp;rsquo;m a software engineer in the cybersecurity industry, and have been for about 3 years now. Specifically, I work on the DevOps branch of the software development ecosystem, so most of the posts on this site revolve around that and cybersecurity, but I&amp;rsquo;ll mix in different topics now and again.
A lot of the blog posts on this site are usually situations I&amp;rsquo;ve encountered while coding, and how they were solved.</description></item><item><title>How To: Embed Streamable.com Videos in Hugo</title><link>https://josusb.com/blog/embed-streamable/</link><pubDate>Fri, 19 Aug 2022 15:27:23 -0400</pubDate><guid>https://josusb.com/blog/embed-streamable/</guid><description>&lt;p>Hey, this is a quick little tutorial on how to embed
&lt;a href="https://streamable.com/" target="_blank" rel="noopener noreferrer">&lt;em>Streamable&lt;/em>&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a> videos to your Hugo website,
like this:
&lt;div style="width:100%; height:0px; position:relative; padding-bottom:42.188%;">
&lt;iframe src="https://streamable.com/e/urwirk?autoplay=1&amp;loop=1" frameborder="0"
allowfullscreen allow="autoplay"
style="width:100%; height:100%; position:absolute; left:0px; top:0px; overflow:hidden;">&lt;/iframe>
&lt;/div>
&lt;/p></description></item><item><title>CTF Guide: You Can't C Me</title><link>https://josusb.com/blog/ctf-you-cant-c-me/</link><pubDate>Fri, 10 Sep 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-you-cant-c-me/</guid><description>Overview# You Can&amp;rsquo;t See Me is a fun CTF on Hack The Box that requires you to reverse engineer a simple C application. It&amp;rsquo;s generally rated as an &amp;ldquo;Easy&amp;rdquo; challenge, and is a good introduction to reversing software and performing malware analysis. As with the other CTF guides, answers will be blurred out. Also for brevity, I won&amp;rsquo;t be including all output of every command.
You can find the link to You Can&amp;rsquo;t See Me here.</description></item><item><title>How To: Build Unity Projects on the Command Line</title><link>https://josusb.com/blog/build-unity-cmd/</link><pubDate>Tue, 07 Sep 2021 07:49:28 -0400</pubDate><guid>https://josusb.com/blog/build-unity-cmd/</guid><description>There weren&amp;rsquo;t a lot of online resources on how to build Unity games from the command line, which was surprising. This would be useful for automating builds, meaning that you don&amp;rsquo;t need to manually interact with the Unity Editor if you only need to compile your game. If you have a large project, not having to load the Editor is a massive time saver. This can all be done through Unity&amp;rsquo;s command line arguments.</description></item><item><title>CTF Guide: Overpass 2 - Hacked</title><link>https://josusb.com/blog/ctf-overpass2/</link><pubDate>Fri, 27 Aug 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-overpass2/</guid><description>Overview# Overpass 2 - Hacked is the second CTF in the Overpass series on TryHackMe, and this scenario has you helping to recover a website that&amp;rsquo;s been hacked! You&amp;rsquo;ll have to analyze a packet capture (PCAP) file with Wireshark to figure out how the attacker got in, then you need to hack back into the server to regain control.
The link to the Overpass 2 - Hacked room is here. You can download Wireshark from the official website.</description></item><item><title>CTF Guide: RootMe</title><link>https://josusb.com/blog/ctf-rootme/</link><pubDate>Mon, 16 Aug 2021 06:16:37 -0400</pubDate><guid>https://josusb.com/blog/ctf-rootme/</guid><description>Overview# RootMe is a short, beginner-friendly CTF on TryHackMe with a ranking of &amp;ldquo;Easy&amp;rdquo;. It&amp;rsquo;s a good complement to practice your skills learned during the &amp;ldquo;Complete Beginner&amp;rdquo; learning pathway, which I recommend completing before attempting this challenge. As usual, direct answers will be hidden in this guide.
You can find the link to the RootMe room here.
The IP address of my target machine was 10.10.255.51, and my attacking machine&amp;rsquo;s was 10.</description></item><item><title>CTF Guide: The Daily Bugle</title><link>https://josusb.com/blog/ctf-dailybugle/</link><pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-dailybugle/</guid><description>Overview# This Marvel-themed, multi-stage CTF is one of TryHackMe&amp;rsquo;s Offensive Pentesting rooms with a difficulty rating of &amp;ldquo;Hard&amp;rdquo;. Some highlights include brute-forcing passwords, SQL injection, and exploiting website templates. Answers in this guide will be hidden or blurred out, as normally.
You can find the link to The Daily Bugle room here.
If you&amp;rsquo;re attempting this CTF, you should already have some foundational knowledge and experience in pentesting. As such, I won&amp;rsquo;t go into much detail into say what nmap arguments mean, or where to get a reverse shell, or how to use John the Ripper.</description></item><item><title>CTF Guide: Skynet</title><link>https://josusb.com/blog/ctf-skynet/</link><pubDate>Sat, 31 Jul 2021 19:44:06 -0400</pubDate><guid>https://josusb.com/blog/ctf-skynet/</guid><description>Overview# This Terminator-themed CTF is one of TryHackMe&amp;rsquo;s Offensive Pentesting rooms, with a ranking of &amp;ldquo;Easy&amp;rdquo;. Exploiting Samba and file inclusion vulnerabilities are some of the highlights here. Direct answers will be hidden in this guide, but before continuing, I recommend that you try hacking this machine without any guides first. Researching on Google, finding red herrings, and even sleeping over the problem are all part of the learning process. Only refer back to this guide when you get stuck for a few days, or want to compare your answers.</description></item><item><title>How To: Save $1,000+ on your AWS Bill</title><link>https://josusb.com/blog/aws-save-money/</link><pubDate>Mon, 12 Jul 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/aws-save-money/</guid><description>The Cost of the Cloud# One of my recent projects was to migrate some testing servers from on-premises to Amazon EC2. There were valid reasons for doing so, with the most pressing being to offload the testing workload to the cloud. Testing isn&amp;rsquo;t run 24/7, so those machines don&amp;rsquo;t need to be online all the time taking up server space. They can be dynamically provisioned en masse on AWS, and terminated once testing is complete.</description></item><item><title>TryHackMe - Welcome to Cybersecurity</title><link>https://josusb.com/blog/welcome-cybersecurity/</link><pubDate>Fri, 09 Jul 2021 19:49:23 -0400</pubDate><guid>https://josusb.com/blog/welcome-cybersecurity/</guid><description>What is TryHackMe?# TryHackMe (or THM for short) is a mostly free (will come back to this shortly), online platform designed for learning cybersecurity, with a focus on hands-on exercises. It has pre-built learning pathways depending on your security knowledge and what path you&amp;rsquo;d like to explore in cybersecurity. Each learning pathway has a set of rooms, which are essentially short learning sessions focused on security topics, tools, or capture the flag (CTF) events.</description></item><item><title>Pokémon Battle Simulator</title><link>https://josusb.com/portfolio/pbs/</link><pubDate>Sun, 04 Apr 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/portfolio/pbs/</guid><description>&lt;p>An open-source game engine built with Unity to emulate the battle system from
the popular Pokémon video game series.&lt;/p></description></item><item><title>Fortnite 2D</title><link>https://josusb.com/portfolio/f2d/</link><pubDate>Sun, 29 Mar 2020 00:00:00 +0000</pubDate><guid>https://josusb.com/portfolio/f2d/</guid><description>&lt;p>A top-down, battle royale shooter with multiplayer and AI survival modes.
This app works on the web and on mobile platforms.&lt;/p></description></item><item><title>Offline</title><link>https://josusb.com/offline/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://josusb.com/offline/</guid><description/></item></channel></rss>