-
Attacking and Defending Active Directory Part I
Introduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information just by checking if the server is misconfigured which enables… -
How to identify phishing emails
This blog post will help you identify phishing emails and learn what are the tools being used in checking if the sender and links are legitimate. The scenario in the next section will tell you the … -
Networking Concepts and Protocols
This blog post contains the Networking Concepts and Protocols course that can be enrolled in Pluralsight. Feel free to skim this outline to get a high-level overview of the topics that were discuss… -
Poor man’s log collection on Windows
Introduction As your organization grows, a lot more log collectors either commercial or freeware are needed to be installed on your network to get logs from different servers running on Windows or … -
Hack the Box Optimum
This is a write-up of the retired Optimum box on Hack the Box. First thing I did was to fire up nmap and ran this command. nmap -sV -sC -oA optimum 10.10.10.8 And got this result. Nmap scan report …
- •
- 1
- 2
subscribe via RSS