Certification: CRTPAfter completing the OSCP, I was trying to find the “what’s next” for my educational journey as well as helping my pentesting career. I…Aug 21, 202052Aug 21, 202052
CrackMapExec BasicsOne of the tools that I like to use against Windows based machines during a pentest or a CTF is CrackMapExec, by Marcello Salvati (aka…Aug 17, 202024Aug 17, 202024
Golden Ticket AttackI have had the opportunity to work on my Windows attacking skills within a couple of different CyberRanges recently. I have been trying to…Aug 12, 202014Aug 12, 202014
Microsoft Office 365 EnumerationI had a recent project to pentest a Microsoft Office 365 (O365) environment. When researching, I found that Microsoft implemented changes…May 14, 2020181May 14, 2020181
AWS Pass-through ProxyI attended a recent on-line preview training of Breaching the Cloud Perimeter; presented by Beau Bullack (@dafthack). This training…May 14, 2020662May 14, 2020662
Certification: OSCPAfter several months of studying, I was finally able to successfully achieve the OSCP certification after two attempts. This has been one…Jan 15, 20201601Jan 15, 20201601
SSH Identity FileFor many years, I have been using SSH to connect to network and UC equipment. I never had a need to look beyond the basic connectivity and…Sep 12, 20192Sep 12, 20192
Incident Response: Attacker ToolsI recently completed my first Attacker vs Defender incident response engagement and it was an awesome experience. I want to clearly state…Aug 8, 2019Aug 8, 2019