NetBIOS Name Spoofing and SMB

NBNS still works!

June 5, 2014 · 4 min · Me

How to create a Metasploit module

Learn how to create a metasploit module

December 13, 2013 · 7 min · Me

DNS Recon

Introductory methods for DNS reconnaissance.

November 22, 2013 · 6 min · Me

BSides DC 2013

Notes from BSides DC 2013

October 21, 2013 · 6 min · Me

Subdomain Enumeration

Techniques for performing subdomain enumeration information gathering.

October 7, 2013 · 3 min · Me

Configure Your Environment

Customize your working environment to your liking

October 1, 2013 · 4 min · Me

Reverse shell methods

Methods for obtaining reverse shells

September 30, 2013 · 3 min · Me

OSX Terminal - List Processes

An exploration of the ps command

June 23, 2012 · 7 min · Me

Federal conference takeaways

Tips picked up from a red/blue infosec conference

June 12, 2012 · 6 min · Me

Powershell Environment Variables

How to determine Powershell environment variables

March 13, 2012 · 2 min · Me