A Veteran’s Guide to Making a Career Jump to Information Security

Transitioning from the military can be a shock to any service member’s system.  We are used to order, discipline, accountability, and upholding standards.  However, when we leave the military, we lose all structure around us and are left to forge our own path.  Some of us have a job lined up one year out and…

What I Learned After a Year as a Cybersecurity Mentor

When I first broke into the field of cybersecurity as a penetration tester, I immediately knew that I wanted help others achieve the same. I started with blogging and helping build a military veteran cybersecurity community here at VetSec. As we grew, I moved into creating YouTube content and eventually live streaming on Twitch. My…

x86 Exploit Development Pt 2 – ELF Files and Memory Segmentation

Hey again! This is part 2 of my Introduction to x86 Exploit Development. If you didn't check out my first part of this series, I highly recommend it before reading this. In this post, we go a little more in depth as to how things get laid out in memory from a program standpoint, now…

Getting Started Guide for VetSec Wargame Exploit Development Tutorials

Hey everyone! This post will serve as a supplement to my first of many tutorials on Buffer Overflows for Linux which will tie into my Exploit Development tutorials. I will try to keep this post focused on the minimum amount of knowledge needed to understand what a buffer overflow is, how it works, and how to…