A walk-through for the Let’s Defend DFIR Remote Code Execution challenge. A forensic investigation with Obfuscated PowerShell, reverse shells, and web shells.
Are you planning on attending DEF CON 31? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 31 experience.
Find out what you need to know to defend against the KeePass vulnerability CVE-2023-32784!
How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!
How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!
Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!
Are you defending PowerShell abuse in your network? Find out the PowerShell best practices for preventing abuse.
Secure your network with Honeypot traps. How to add an early warning system to your network using this free tool.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
A custom company-specific wordlist is vital to conducting password audits or blocking weak passwords from being set. Read how you can build a wordlist targeted at your company and defend against weak passwords.