MonitorsFour Box Write Up (HackTheBox)
This is an educational write up for the MonitorsFour Box on HackTheBox (link here). This box demonstrates several concepts including PHP type juggling, Docker security misconfigurations, and a Dock...
This is an educational write up for the MonitorsFour Box on HackTheBox (link here). This box demonstrates several concepts including PHP type juggling, Docker security misconfigurations, and a Dock...
This is an educational write up for the Code Part Two Box on HackTheBox (link here). This box is a follow up to Code Part One, which can be found here. Reconnaissance Reconnaissance is the inform...
This is an educational write up for the Soulmate Box on HackTheBox (link here). I’ve tried to write it so less technical people would be able to understand. Initial Configuration Add this line to...
This is my process while doing the HTB CDSA Malware Reverse Engineering Skills Assesment. The module from HTB covers static analysis with IDA, debugging with x64dbg and dynamic analysis with Norib...
For the final part of this series, we’ll finally get to simulate some attacks on our environment. To do this we’ll use Finalizing Kali Linux Setup First we need to set the correct network setti...
In the previous parts, we set up our virtual machines, configured networking, and installed Splunk with Sysmon for logging on both Windows machines. Now we’ll be installing and configuring Active D...
In part 1 of this project, we set up all of our virtual machines and did some basic configuration. In this part we’ll be installing and configuring Splunk on our Ubuntu server and setting up Sysmo...
I wanted to get some hands-on experience with Active Directory and Splunk, so I figured I would set up a home lab. This can serve as a tutorial for anyone wanting to build an Active Directory home...