Learn how to quickly Download Private SoundCloud Audio Files by using SoundCloud’s API.
Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
My review of Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, is Kevin Mitnick’s autobiography.
My review of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. TLDR: Its a must-read.
Learn how to build obfuscated Bash backdoors with some help from ChatGPT. Can Hackers use ChatGPT to build them the Bash malware they need? Find out in this blog post.
Protect your data from cybersecurity incidents like ransomware, hardware failures, or natural disasters with a 3-2-1 Backup Strategy.
How you can protect your Windows Servers from 2FA bypass and Pass-the-Hash Attacks. Your Yubikeys or Duo Authentication cannot fully protect you! Secure the WinRM service now!
How you can leverage built-in Windows OS tools to bypass Two-Factor Authentication. Bypass Yubikeys and Duo 2FA! Red Team TTPs!
Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.
LetsDefend’s DFIR challenge “Infection with Cobalt Strike” walk-through!