Skip to content

bitsekure

Tech Tips…

Menu
  • Home
  • Security
    • Malware Analysis Setup
      • Esxi VmWare
    • Malware Analysis
    • Scripting
    • Techniques
  • Network
  • About
  • Training
Search

Category: Security

Posted onNovember 6, 2022November 6, 2022Security

Security Tips in Insecure Environments

This list will occasionally be updated with tips for securing insecure environments, some that can’t be secured using best practices. These solutions may fix certain…

Read More
Posted onAugust 21, 2022August 21, 2022Security

Responder Experiments Part 1

Responder is tool that can be used to poison DNS,LLMNR, and Netbios requests on a network. There are other resources out there that will provide…

Read More
Posted onMarch 19, 2021Security

Microsoft.Workflow.Compiler.exe Part 2 WDAC Policy

Device Guard is like Applocker but has more features. You can block DLL’s, drivers, there is even a virtual based security. Microsoft has now moved…

Read More
Posted onMarch 2, 2021Security

Microsoft.Workflow.Compiler.exe Applocker bypass Part 1 Powershell

There has been multiple posts about this technique. Matt Graeber has a very good post going over how the workflow compiler, can be used to…

Read More
Posted onOctober 9, 2020Scripting

Powershell Tip Random Password

Powershell has alot of potential in it’s ability to allow .net functionality. This is also the reason why Microsoft has been using powershell alot in…

Read More
Posted onMarch 15, 2020March 17, 2020Security

APIPA Tip

From anyone who has taken any networking lessons, one of the early things taught is APIPA. Automatic Private IP Addressing (APIPA) is a feature of…

Read More
Posted onFebruary 13, 2020March 17, 2020Security

Arp Spoofing & VLAN Hopping

I’ll touch on what this is briefly. You will have to research more if you aren’t familar with VLAN’s and ARP. Arp spoofing is a…

Read More
Posted onJanuary 11, 2020March 17, 2020Scripting

Powershell Tip Fast Directory Creation

This powershell command will involve the for loop. This type of loop iterates through a sort of timer, when that condition is met the loop…

Read More
Posted onDecember 22, 2019December 22, 2019Malware Analysis Setup

Hyper-V Malware Analysis Part #1

Okay this series will be going over how to setup Hyper-V for malware analysis. I won’t be covering Hyper-V server in depth so I recommend…

Read More
Posted onDecember 22, 2019December 22, 2019Malware Analysis Setup

Hyper-V Malware Analysis Part #2

I have been in the process of setting my Dell server up with Windows Server 2016. I had ESXI earlier but with Windows Server I…

Read More

Posts navigation

Page 1 Page 2 Next Page
© Copyright 2020 – Bitsekure
Anther Theme by DesignOrbital ⋅ Powered by WordPress