Please, Please, Please Stop Getting NTLM Relayed
Your Front Door is Open You’re a seasoned sysadmin. You’ve been contracted to setup domain infrastructure for a SME - file servers, databases, domain controllers, the whole thing. Office 365 accou...
Your Front Door is Open You’re a seasoned sysadmin. You’ve been contracted to setup domain infrastructure for a SME - file servers, databases, domain controllers, the whole thing. Office 365 accou...
Wazuh Wazuh is an open-source SIEM platform that enables defenders to implement logging and detection infrastructure at no cost. The project is an incredible accomplishment and is continuously b...
Introduction to AMSI AMSI, or Anti Malware Scanning Interface, is what Windows uses to detect malware contained in scripts. Scripts may be downloaded remotely and executed only from memory, thereb...
If you’re in the threat intelligence space, you’ve probably seen headlines about $1 billion dollar crypto heists pulled off by Lazarus group in North Korea. You’ve seen multi-million dollar deals b...
Static Analysis Windows Defender, like most EDRs and AV solutions, has a static analysis component. This component has multiple detection techniques for analyzing suspicious files. The important t...
wifinetic two WifineticTwo is the latest box in Season 4 on HackTheBox and a sequel to Wifinetic. It’s a Medium-Easy box which focuses on wireless networking. As a note - I had to restart the box...
Candidate Points In white-box penetration testing and source code review, “candidate points” are functions or endpoints that represent possible vectors of attack for malicious user input. An examp...
My Certificate Introduction In September of 2023, I decided I wanted to change careers to cybersecurity. I started off with some fundamentals by getting my Network+ and Security+ certifications ...