Review: SANS Cyber FastTrack 2019

         This spring, I received an email through my university with an invite for a program called Cyber FastTrack. The part that caught my eye was that it was prepared by SANS, which is known throughout the field of Cybersecurity for providing top-notch training on just about every subject. I didn’t (and still don’t) consider…

A Veteran’s Guide to Making a Career Jump to Information Security

Transitioning from the military can be a shock to any service member’s system.  We are used to order, discipline, accountability, and upholding standards.  However, when we leave the military, we lose all structure around us and are left to forge our own path.  Some of us have a job lined up one year out and…

What I Learned After a Year as a Cybersecurity Mentor

When I first broke into the field of cybersecurity as a penetration tester, I immediately knew that I wanted help others achieve the same. I started with blogging and helping build a military veteran cybersecurity community here at VetSec. As we grew, I moved into creating YouTube content and eventually live streaming on Twitch. My…

Vetsec Becoming a Non-Profit!

Hello everyone! This announcement is long overdue. VetSec is moving forward with our non-profit initiative. Today, we registered for non-profit in hopes of gaining a more traction and helping us solidify a more official purpose.With that being said, we've set up a Patreon page to help cover costs for future endeavors. If you can spare…

x86 Exploit Development Pt 2 – ELF Files and Memory Segmentation

Hey again! This is part 2 of my Introduction to x86 Exploit Development. If you didn't check out my first part of this series, I highly recommend it before reading this. In this post, we go a little more in depth as to how things get laid out in memory from a program standpoint, now…

Getting Started Guide for VetSec Wargame Exploit Development Tutorials

Hey everyone! This post will serve as a supplement to my first of many tutorials on Buffer Overflows for Linux which will tie into my Exploit Development tutorials. I will try to keep this post focused on the minimum amount of knowledge needed to understand what a buffer overflow is, how it works, and how to…