This list will occasionally be updated with tips for securing insecure environments, some that can’t be secured using best practices. These solutions may fix certain…
Responder is tool that can be used to poison DNS,LLMNR, and Netbios requests on a network. There are other resources out there that will provide…
Device Guard is like Applocker but has more features. You can block DLL’s, drivers, there is even a virtual based security. Microsoft has now moved…
There has been multiple posts about this technique. Matt Graeber has a very good post going over how the workflow compiler, can be used to…
Powershell has alot of potential in it’s ability to allow .net functionality. This is also the reason why Microsoft has been using powershell alot in…
I’ll touch on what this is briefly. You will have to research more if you aren’t familar with VLAN’s and ARP. Arp spoofing is a…
This powershell command will involve the for loop. This type of loop iterates through a sort of timer, when that condition is met the loop…
Okay this series will be going over how to setup Hyper-V for malware analysis. I won’t be covering Hyper-V server in depth so I recommend…
I have been in the process of setting my Dell server up with Windows Server 2016. I had ESXI earlier but with Windows Server I…