Cyber Defense Training

I provide live instructor-led cyber defense training. The outline of the course is detailed below. Contact me for more information or to schedule a training. I. IntroductionA. Importance of online securityB. Overview of the training topics II. Understanding the BasicsA. Online threats and common attack vectorsB. Personal data and its Read more

Threat Modeling

nd threats within an application, system, or network. It involves systematically analyzing the architecture, components, and data flows to understand how attackers might exploit weaknesses. Threat Modeling in Penetration Testing 1. Scope Definition: 2. Gather Information: 3. Identify Assets and Data Flows: 4. Decompose the System: 5. Identify Threats: 6. Read more

Kerberosting

Kerberoasting is a popular attack technique used by cybercriminals to exploit the Kerberos protocol in Windows Active Directory environments. This blog post will discuss the inception of kerberosting, its impact on Active Directory environments, and the steps penetration testers take to use this technique in their assessments. We’ll delve into Read more

curl command

The curl command is a versatile and powerful tool that allows users to transfer data to and from a server using various network protocols such as HTTP, HTTPS, FTP, and more. It is widely used by developers, system administrators, and even casual users for tasks ranging from testing APIs to Read more

Web Requests

eb requests are the backbone of the internet. Whether you’re browsing a website or making an API call, every interaction with a web application involves sending and receiving web requests. In this post, we will explore the basics of how web requests work. What is a web request? A web Read more

Nmap

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap.org This tool can be used to to obtain a network inventory, determine what ports are open on a host, what services are running on ports, the version of those services, operating system Read more