AWS Automated Cloud Compliance Tools. Getting PacBot to work 101
Why you need to microsoft tiers, and update update update custom software.
As numbers flew back and forth, I kept my cool. I found it rather hilarious that when I asked one question, the man would droll on for minutes. He said something about working for 43 years. His finger tapped at his temple, while he boasted about all the knowledge in “here.” He said something about a computer system that costs him an arm and a leg each month. “$700!” his voice echoed.
does this show up too
A prepackaged deployment of Bloodhound and Neo4j. Get on your testing feet in no time with this deployment.
A ten minute lab to set up a simple repeatable method for creating an Active Directory honeypot in your DMZ
Major updates rolling into the BadBlood Active Directory Generator toolkit. Check out sidhistory injection, speed upgrades and more.
These 3 items deployed greatly increase your security footprint. They are simple. They are quick. They are necessary. They are hardly deployed anywhere
A Sidhistory Active Directory attack unveiled and revealed. How do attackers gain access using this well hidden attribute? How quick is this attack?
If you don't think you can gain further access into a domain, think again. Use simple permissions to alter the domain and escalate privileges even further
How fast does it take for an experienced attacker to put a backdoor into your identity system? The answer is much quicker than you ever imagined.
You can have all the permissions of a group without ever being a member of the group. You can do this without showing up in the group member list.
When can you see LAPS passwords? What ACLs do you need to access the password? Make sure you know who can gain administrator privileges to the computer!
How did BadBlood come to be? How did I slap code together and get this tool running in under 2 weeks? Find out more about BadBlood here