top of page
Search

APT Big Daddy
May 30, 20235 min read
"Advanced Cyber Knowledge" (ACK) - WDigest Decoded
Exploring LSASS and WDigest's roles in Windows security: their efficient yet vulnerable structures and how they're exploited for cyberattack

APT Big Daddy
Oct 10, 20229 min read
Fun with PowerShell – Executing commands with DNS requests
Can executing PowerShell commands with DNS records can be fun, or can it be an absolute headache, you decice.
bottom of page