This list will occasionally be updated with tips for securing insecure environments, some that can’t be secured using best practices. These solutions may fix certain…
Responder is tool that can be used to poison DNS,LLMNR, and Netbios requests on a network. There are other resources out there that will provide…
Great thing about Linux is the netcat tool. It always you to do quick network testing, network scanning, and can even establish reverse shells. I…
The crazy thing is Cisco requires you to have a service contract to download the Rest api file https://software.cisco.com/download/home/286119613/type/286284108/release/7.15.1 Which I would expect to be…
In order to follow along with this you should know what VLAN’s, trunking, DHCP, ARP, and cisco layer 2 protection such as sticky macs. Change…
When you have the free version of Esxi you don’t have such features as vSphere and distributed switches. With the distributed switches you can create…
Device Guard is like Applocker but has more features. You can block DLL’s, drivers, there is even a virtual based security. Microsoft has now moved…
There has been multiple posts about this technique. Matt Graeber has a very good post going over how the workflow compiler, can be used to…
Just got some Assassins creed bundles and listing various fixes 😊 Wherever you extracted the file from Humble Bundle download links, navigate to that path.…
I’ll be listing common errors you may come across using Microsoft virtual machine converter. This is a powershell tool you can use to convert files…