Published inNerd For TechHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 5: Threat…This article is part of a series, if you haven’t read the previous article check it out here:Mar 12, 2024Mar 12, 2024
Published inNerd For TechHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 4This article is part of a series, if you haven’t read the previous article check it out here:Mar 7, 2024Mar 7, 2024
Published inInfoSec Write-upsActive Directory Basics: Kerberos AttacksKerberoastingMar 6, 2024Mar 6, 2024
Published inNerd For TechActive Directory Basics: A brief introduction to KerberosIntroMar 5, 20241Mar 5, 20241
Published inNerd For TechHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 3This article is part of a series, if you haven’t read the previous article check it out here:Mar 5, 2024Mar 5, 2024
Published inNerd For TechHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 2This article is part of a series, if you haven’t read the previous article check it out here:Feb 29, 2024Feb 29, 2024
Published inNerd For TechHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 1IntroFeb 27, 2024Feb 27, 2024
Published inInfoSec Write-upsAndroid Hacking: Exploiting Broadcast ReceiverBroadcast ReceiverFeb 26, 2024Feb 26, 2024
Published inInfoSec Write-upsMalware Development: Windows Defender EvasionThis article will show you how to create a dropper that evades Windows Defender. This article is part of a series, if you haven’t read the…Nov 20, 2023Nov 20, 2023
Published inInfoSec Write-upsMalware Development: How to inject a payload into another processThis article will show you how to execute our shellcode into another process. This article is part of a series, if you haven’t read the…Oct 10, 2023Oct 10, 2023
Published inInfoSec Write-upsMalware Development: How to create a TrojanThis article will show you how to create a simple trojan. This article is part of a series, if you haven’t read the previous article check…Aug 29, 2023Aug 29, 2023
Published inInfoSec Write-upsMalware Development: How to store a payload in different sections of a PE fileThis article will show how to store a malicious payload in different sections of a PE file. This article is part of a series, if you…Jul 23, 2023Jul 23, 2023