Who ya gonna call? -m 27100!
25 August 2023
Can't crack an NTLMv2 to plaintext during an engagement? Have you tried Hashcat's 27100 mode?
Offensive Security Rants & Threat Actor Roleplay
25 August 2023
Can't crack an NTLMv2 to plaintext during an engagement? Have you tried Hashcat's 27100 mode?
19 February 2023
That time I (hacked) obtained a root shell on a $60,000 lighting console while waiting for Beartooth to go on stage and ended up getting a CVE out of it.
03 June 2022
An informative blog post detailing my first time setting up, configuring, and leveraging Mythic C2 to obtain multiple shells on both a Windows and Linux host as well as some basic post-exploitation activities.
10 May 2022
Securing infrastructure (almost) automagically with CrowdSec. Learn how to setup CrowdSec, configure Bouncers, and view logs/alerts. Also, in typical offensive security fashion, we're going to be the one performing attacks against the CrowdSec installation.
A spinoff of HuskyHacks' post on building red team infrastructure with Nebula, however with a small twist of using Empire as our C2 of choice. This post explores how to setup this infrastructure and pop a glorious shell using Empire's frontend "Starkiller".
21 April 2022
A (somewhat) organized dump of the notes and resources I heavily referenced when taking the OSCP in 2022.