To Catch a Hacker in My Home Lab – Atreides

Introduction This blog post will walk you through how to answer the questions that are contained in my Atreides scenario located here: The Jupyter Notebook file is located there. The blog post will go through the initial access vector, situational awareness commands that were run, persistence mechanism used, how privilege escalation to System was […]

Read More To Catch a Hacker in My Home Lab – Atreides

Detecting mshta in a Home Lab

Today I wanted to do a quick blog post on how to test your security tools to find the Windows binary mshta.exe downloading a malicious .hta file. My setup is an Elastic Stack VM, a Windows endpoint configured with Elastic’s endpoint agent. In addition, I used a Parrot security VM as my attacking machine and […]

Read More Detecting mshta in a Home Lab

SSH Tunnelling

In today’s blog post I wanted to talk about Secure Shell (SSH) and some of its powerful features. We will start with some of the basics such as what it is, what it does, and then more advanced concepts such as how an adversary can use it to hide themselves, through multiple layers of cloud […]

Read More SSH Tunnelling