Latest Posts

Replication Through Removable Media

In this post, I am going to go over a real world example of how attackers achieve replication through removable media. This will take...
d3d
1 min read

Hardware Additions

In this post, I am going to go over a real world example of how hardware additions are used to assist operators in creating...
d3d
42 sec read

Brute-forcing HTTP Authentication with Python3

In this post I am going to create a tool to brute-force HTTP Authentication for both Basic and Digest authentication mechanisms which includes the...
d3d
1 min read

Setting up GNS3 on Arch Linux

GNS3 is used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. It’s also a great...
d3d
1 min read

Setting up the ‘PhanTap’

The ‘PhanTap’ is an ‘invisible’ network tap written by the guys at NCC Group and aimed at red teams. With limited physical access to...
d3d
2 min read

Exploit Public-Facing Applications

In this post, I am going to go over a real world example of how public facing applications are attacked. This is a very...
d3d
1 min read

Drive-by Compromise

In this post, I am going to go over a real world example of how a drive-by attack works to exploit a target user’s...
d3d
1 min read