Ronny Thammasathiti & James KellyOct 26, 202312 minHow to Build Your Own DNS Sinkhole and DNS Logs Monitoring SystemPi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
Esther MatutAug 16, 20238 minIntroduction to Proving GroundsThe Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms
Erica ZelicJul 25, 20235 minPlaying with Bubbles: An Introduction to DLL-Sideloading DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Erica ZelicJul 5, 20236 minLDAP Queries for Offensive and Defensive OperationsThe intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can