Don’t Let Scheduled Tasks Compromise Your Security: 4 Ways to Detect and Prevent Them

Scheduled tasks are a powerful feature of Windows that allow you to automate tasks. However, they can also be a double-edged sword if they are hijacked by adversaries to launch attacks or maintain persistence. In this post, I will reveal 4 ways to detect and prevent scheduled tasks from compromising your security. 1. Monitoring the […]

Read More Don’t Let Scheduled Tasks Compromise Your Security: 4 Ways to Detect and Prevent Them

Reconnaissance: The First Step to Successful Penetration Testing

Reconnaissance is the process of gathering information about a target system or network before launching an attack. It is a crucial step in any penetration testing process, as it helps to identify the target’s vulnerabilities, weaknesses, and potential entry points. Reconnaissance can be performed in two ways: passively or actively. Passive reconnaissance involves collecting information […]

Read More Reconnaissance: The First Step to Successful Penetration Testing

To Catch a Hacker in My Home Lab – Atreides

Introduction This blog post will walk you through how to answer the questions that are contained in my Atreides scenario located here: https://github.com/medmondson44/dune/tree/main/atreides. The Jupyter Notebook file is located there. The blog post will go through the initial access vector, situational awareness commands that were run, persistence mechanism used, how privilege escalation to System was […]

Read More To Catch a Hacker in My Home Lab – Atreides

Detecting mshta in a Home Lab

Today I wanted to do a quick blog post on how to test your security tools to find the Windows binary mshta.exe downloading a malicious .hta file. My setup is an Elastic Stack VM, a Windows endpoint configured with Elastic’s endpoint agent. In addition, I used a Parrot security VM as my attacking machine and […]

Read More Detecting mshta in a Home Lab

SSH Tunnelling

In today’s blog post I wanted to talk about Secure Shell (SSH) and some of its powerful features. We will start with some of the basics such as what it is, what it does, and then more advanced concepts such as how an adversary can use it to hide themselves, through multiple layers of cloud […]

Read More SSH Tunnelling