About CompSec Direct

CompSec Direct is a C4ISR firm specialized in CyberSecurity. SDVOSB, QMCS & MBE certified firm of former DOD network operators.

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

By |2022-06-15T00:53:53-04:00October 7th, 2016|Categories: Cyber, Demo, Pen-testing, Training|Tags: , , , , |

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files in conjunction with the Shodan api in python to search for associations between different different fields. Using this tool reduces initial [...]

Comments Off on CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

By |2022-06-13T18:23:30-04:00October 7th, 2016|Categories: Cyber, Defensive Methodology, Demo, Forensic, Hunting, Training|

We hosted a training session on remote incident response operation on Oct 7, 2016. The course was provided “pro-bono” through @Obsidis_NGO‏, participants paid a small registration fee that covered lunch. Students were able to analyze malware on remote systems in a safe and controlled environment using our RIL platform. We want to thank everyone who attended the session and [...]

Comments Off on CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

Forcepoint 2015 Threat Report

By |2022-06-15T00:55:26-04:00February 15th, 2016|Categories: Attribution, Cyber, Defensive Methodology, Forensic, Hacking, Hunting, Pen-testing, Reports, Tor|

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Comments Off on Forcepoint 2015 Threat Report

Why going after wp-config is a quick way to get banned

By |2022-06-15T00:59:14-04:00January 15th, 2016|Categories: Attribution, Defensive Methodology, Hacking, Reports, Wordpress|

The first is actually more common place. The second assumes the admin that maintains WordPress leaves a backup or older version of the file readable by any visitor that happens to “guess” a filename. In the past, CompSec Direct has been successful employing both techniques for customers during security audits, however the second leaves a 404 [...]

Comments Off on Why going after wp-config is a quick way to get banned

Security firm sued for filing “woefully inadequate” forensics report -Arstechnica

By |2022-06-15T01:27:43-04:00January 15th, 2016|Categories: Breach, Forensic, Lawsuit|Tags: , , |

Arstechnica's Dan Goodin has reported that Trustwave is being sued by Affinity Gaming for not eliminating malware presence after a forensic investigation had been done. Mandiant uncovered the malware during a follow up PCI forensic investigation. See full-article below. Security firm sued for filing “woefully inadequate” forensics report

Comments Off on Security firm sued for filing “woefully inadequate” forensics report -Arstechnica

Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items

By |2022-06-13T18:34:26-04:00July 20th, 2015|Categories: Cyber, Laws, Legislation|Tags: , , , |

CompSec Direct and other individuals and companies spoke out against the 2013 Wassenaar Arrangement. We hope our petitions for further revisions are heard. We have included a copy of the document submitted to http://www.regulations.gov/#!docketDetail;D=BIS-2015-0011 Wassenaar Agreement CompSecDirect We want to thank everyone that submitted and stood up for freedom of speech against the Wassenaar Arrangement 2013.

Comments Off on Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

By |2022-06-15T01:26:03-04:00June 13th, 2015|Categories: Breach, Hacking, Reports|Tags: , |

Excellent report by Kaspersky that unmasks a breach inside their corporate infrastructure. Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks

Comments Off on Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

By |2022-06-13T18:35:49-04:00May 29th, 2015|Categories: Attribution, Defensive Methodology, Demo, Hacking, Tor|Tags: , , , , , , , |

Hello from Puerto Rico. Here are our slides from Jose Fernandez’s talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the future. By the time we got to the beach, the Internet is hopefully in a slightly better state than we left [...]

Comments Off on Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

By |2022-06-13T18:36:39-04:00April 12th, 2015|Categories: Cyber, Defensive Methodology, Demo, Hunting, Powershell|Tags: , , , , , |

Hello Everyone, Here are the slides from our presentation at Bsides Charm 2015. We look forward to coming back next year for another excellent community driven event.Mass Hunting with Powershell

Comments Off on BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

Pen-testing Guidelines posted from PCI-DSS

By |2022-06-15T01:24:07-04:00April 4th, 2015|Categories: Pen-testing, Reports|Tags: , , , |

PCI-DSS recently released a revised document that covers pen-testing requirements for merchants and security providers. The document does a good job of comparing pen-testing with vulnerability assessments. If your company recently had a pen-test or vulnerability assessment done that did not cover all of these area and more, then call us and compare. Here is a [...]

Comments Off on Pen-testing Guidelines posted from PCI-DSS
Go to Top