This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Automation Series Part 1: Vagrant & Ansible
This blog post will be the first in the series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building blocks...
Setting up a Basic AD Lab Environment
I wasn’t going to be making a post on this topic, but since a few of my posts refer back to having a domain set up, I thought it would be useful to explain the process of setting up your own local ...
Digging in to EventID 4625
Using event logs to determine whether an attack is possible has been used by blue and red teams alike. Several hacking groups such as turla have been using antivirus logs to determine whether their...
Art and Science
This post is going to focus on the importance of having both an intellectual as well as an artistic outlet in ones life, and provide you with some great free resources that I have come across which...
Starting out with Kibana and ElasticSearch-DSL
Over the course of the past few weeks, I have been looking into Splunk and Kibana. This post isn’t a comparison of the two, but there are several posts covering this topic. Splunk is a great altern...
Working as a Pentester
There are a number of posts out there which have catch phrases like “it’s a journey, not a destination”, “you have to do whatever it takes”, “think outside the box”, and “you must have an attackers...
Issues with Golang and Windows Registry
I started out with the idea of creating Golang payloads which would be able to bypass Antivirus (AV) software when doing security assessments. However, many AV solutions are becoming increasingly s...