Exnoscan is a simple bash script that can help you identify gaps. We often monitor what we know, so Exnoscan aims to identify what you don’t…..
Category: Cyber Security
Building an NSG logger
My first attempt at a logger was for short term. It became apparent quite quickly that this wouldn’t be a long standing solution to avoid the log analytics costs………………….
The not so isolated risk of legacy systems
Unfortunately, in today’s world, it is not just Vladimir Putin running Windows XP. Many continue to run the risk of… Read more The not so isolated risk of legacy systems
Brute Force Web Logins
If you have a login page which is reachable over the internet, at some point it’s going to get attacked. The reason why is because it can be extremely easy for attackers to do so….
RedRabbit Update
Find the latest here: https://github.com/securethelogs/RedRabbit
YouTube: Amass, Pwndrop and Sherlock
Check them out here: https://www.youtube.com/channel/UCX6XBBAw-G_9R1gzfKTzMYg
Phishing.web.core.windows.net
EvilGinx is a prime example of some of the amazing tools out there that came be used for Phishing. If you haven’t heard of it, EvilGinx was release a few years back and showed us a weak point in 2FA. For most back then, MFA was a sure way to thwart the bad guys and it make the system or user account “impenetrable”…..
Living Off The Land: Suspicious System32
The services below are some of the most commonly abused services for malicious parties to “live of the land”. Each are built into Windows and inherit trust by default. Because of this, security controls won’t ever be able to fully isolate them without affecting the operating system. For example, your endpoint protection can’t block command prompt and Powershell because engineers use them for automation tasks, nor can it block task scheduler or certuitl…….
Now on YouTube!
Hacking With Powershell: Malware
With malicious parties continuing to use Powershell as their way in, I thought I would look into how it’s being used and what can be done to prevent it. This is something I’ve covered before, so think of this as a part 3…………