Cyber Security Resources
Whitepapers
Improve your cybersecurity by reading our whitepapers and learning from our experts
Labs
Take a look at our tools, presentations, and policies
Cook With Carve: Baked Chicken Katsu
Tonkatsu is a popular Japanese fast food made of fried breaded pork topped with a rich savory sauce. This recipe is inauthentic in every way, but it's almost as good, way easier to make in a home kitchen, and healthier. Instead of pork, it uses chicken;...
Practical Phishing Defense
In my previous post, we looked at some of the core areas an individual should check when identifying a phish. Learning those phishing red flags will help at the individual level, but you can take it even further by making use of various phishing defense techniques designed to operate at the...
Getting better sleep
Of the three pillars that hold up the tower of personal health and wellness (diet, exercise, and sleep), the one that might be the most important is the one most often neglected. When running a google search for fitness, one can find hundreds upon hundreds of results touting the best exercise...
Busting out of a fitness rut
When I’m operating at what I feel is my peak professionally and as a husband/father/friend, I am usually also diligently navigating towards an athletic goal. But as I get older and responsibilities and stress increase, I find it harder and harder to prioritize time for athletic pursuits. And when...
Cooking with Carve: Gyūdon
I love this dish because of the rich flavors and how it's easier than it seems (it pipelines well). The main ingredients are beef, onion, and egg, and the flavor is sweet and savory from mirin and soy sauce. It works as a whole meal and also as a main dish served along miso soup, salad, and...
Credentialed Windows Remote Code Execution techniques
In this article, we’ll discuss some of the different ways we can execute arbitrary code or commands when we have already obtained Windows domain credentials, either in their plaintext form (user + password) or NTLM hashes. Even though the techniques described here are heavily focused on offensive...
Stay Connected
Stay on top of the latest in cybersecurity tools, news, and opinion with @carvesystems on social media! Check out our blog for cyber tips, tricks, and all things infosec.