A little guide for locking down a VPS or similar to ensure your SSH connection is as secure as can be.
TL;DR I passed! & The course was great!
As an attacker I come across Splunk a lot but I've never deployed it. This blog post will deep dive into deploying it and querying the back end!
This post comes off the back of a series of tweets I made one morning, I decided that after a long thread it was probably better to combine into one post. So here
Dive into both Kerberoasting and ASREP Roasting, looking at how they work, how to introduce them into an environment and how to fix them or where possible monitor and defend against them.