A walk-through for the Let’s Defend DFIR Remote Code Execution challenge. A forensic investigation with Obfuscated PowerShell, reverse shells, and web shells.
Are you planning on attending DEF CON 31? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 31 experience.
Find out what you need to know to defend against the KeePass vulnerability CVE-2023-32784!
How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!
How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!
Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!
Secure your network with Honeypot traps. How to add an early warning system to your network using this free tool.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
A custom company-specific wordlist is vital to conducting password audits or blocking weak passwords from being set. Read how you can build a wordlist targeted at your company and defend against weak passwords.
How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.