Welcome to my Cybersecurity blog where I share tutorials, projects, and insights from my experience and research.
Latest Posts
-
IPv4 Deep Dive
A slightly on the spectrum look at IPv4 addresing and classes
-
Windows Server Active Directory VM Setup with VirtualBox and Linux
Guide to setting up an Active Directory Domain Controller in VirtualBox using Kali
-
TryHackMe - Bypass Disable Functions
How to get around PHP disabled_functions utilizing Local File Injection (LFI) and a bit on named pipes and reverse shells.
-
GoLang malware utilyzing DLL Injection on a remote process
Exploring remote process DLL Injection, DLL writing, and deploying a gob encoded tcp bind shell.
-
GoLang malware utilyzing rc4 encryption to avoid shellcode detection
EDR evasion using rc4 encrypted shellcode by writing a file to disk, downloading rc4 encrypted payloads from a server and injecting them into memory.
-
TryHackMe - Ice
Standard Nmap and Metasploit with mimikatz thrown into the mix for fun. Vulnerability and exploit research, privilege escalation, RDP sessions, and a few tricks to spy on the target.
-
TryHackMe - Intro PoC Scripting
Exploit development from Proofs Of Concept and CVEs. Explore a Ruby exploit, rewrite it in Python. Payload development, authentication development. Just a really good room for coding and how to...
-
TryHackMe - Blue
Vulnerability scanning using nmap, exploitation using metasploit. Examples of creating a reverse TCP shell, upgrading the shell, process migration, hash cracking, and search to find flags.