AD Hardening: Inactive Computer Objects

Are inactive computer objects plaguing your Active Directory database? Find out how to automatically keep AD clear of old computer objects. Maintain a clean AD database to keep AD secure.

What You Need to Know to Defend Against CVE-2022-30190!

Office documents exploiting CVE-2022-30190 are coming to an inbox near you! Find out how you can prepare and mitigate this threat!

AD Hardening Against Kerberos Golden Ticket Attack

What you need to know about Golden Ticket Attacks and how to defend against them! An overview of the Golden Ticket Attack and guidance on protecting Active Directory.

How to Investigate Malicious DNS Requests

How to track down malicious DNS requests in Windows systems. Incident response techniques for DNS security products like Cisco Umbrella, or DNSFilter.

RedTeam Tip: Hiding Cronjobs

RedTeam Tip. How to maintain backdoor access with hidden Cronjobs in Linux systems. Conceal Linux backdoors scripts and executables.

Webserver VHosts Brute-Forcing

How to uncover hidden websites through brute-forcing FQDN. GoBuster is missing this!

Secure Windows Remote Management from 2FA Bypass

How you can protect your Windows Servers from 2FA bypass and Pass-the-Hash Attacks. Your Yubikeys or Duo Authentication cannot fully protect you! Secure the WinRM service now!

Bypass 2FA on Windows Servers via WinRM

How you can leverage built-in Windows OS tools to bypass Two-Factor Authentication. Bypass Yubikeys and Duo 2FA! Red Team TTPs!

You Can Help Defend the Internet!

Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.

LetsDefend’s DFIR Challenge: Infection with Cobalt Strike Walk-Through

LetsDefend’s DFIR challenge “Infection with Cobalt Strike” walk-through!

« Older posts

© 2022 Cyber Gladius

Up ↑