Readers of ZSEC and my Twitter feed, A quick message/explanation. I have published my last two blog posts for a while as I am working on my second book; LTR102 [https://leanpub.
Deploy your hacklab using Ansible and Vagrant for fast, repeatable results. Building on the work by @myexploit2600, we're going to use Ansible and Vagrant to automate the manual steps of constructing a domain and vulnerable users.
This post will walk through various services within the Azure catalogue and look at potential attack paths.
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
Exploiting Petit Potam in a different way to force some downgrade and protocol attacks.