A quick overview of triage data acquisition in the context of attack/defend CTFs.
Month: January 2021
Post-Exploitation With gawk
Some post exploitation techniques using gawk.
Accessing Alternate Data Streams on VMDK Images on Linux
Accessing Alternate Data Streams on VMDK Images on Linux.
REVIEW: Malware Data Science – Attack Detection and Attribution
Review of Malware Data Science: Attack Detection and Attribution
REVIEW: RED TEAM Operator: Windows Persistence Course by SEKTOR7 Institute
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
git: You can’t push to git://…
Configure a git repository's origin as SSH rather than HTTPS.