Category Security Research

Download Private SoundCloud Audio Files

Learn how to quickly Download Private SoundCloud Audio Files by using SoundCloud’s API.

The Active Directory Access Control List Explained

Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.

Ghost in the Wires – Book Review

My review of Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, is Kevin Mitnick’s autobiography.

Tracers In The Dark – Book Review

My review of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. TLDR: Its a must-read.

Building Linux Backdoors with ChatGPT

Learn how to build obfuscated Bash backdoors with some help from ChatGPT. Can Hackers use ChatGPT to build them the Bash malware they need? Find out in this blog post.

How To Build A 3-2-1 Backup Strategy

Protect your data from cybersecurity incidents like ransomware, hardware failures, or natural disasters with a 3-2-1 Backup Strategy.

Secure Windows Remote Management from 2FA Bypass

How you can protect your Windows Servers from 2FA bypass and Pass-the-Hash Attacks. Your Yubikeys or Duo Authentication cannot fully protect you! Secure the WinRM service now!

Bypass 2FA on Windows Servers via WinRM

How you can leverage built-in Windows OS tools to bypass Two-Factor Authentication. Bypass Yubikeys and Duo 2FA! Red Team TTPs!

You Can Help Defend the Internet!

Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.

LetsDefend’s DFIR Challenge: Infection with Cobalt Strike Walk-Through

LetsDefend’s DFIR challenge “Infection with Cobalt Strike” walk-through!

« Older posts

© 2024 Cyber Gladius

    Follow Me on my Mastodon      - Infosec.Exchange Mastodon     IOC.Exchange Mastodon

Up ↑