NetExec for SMB Enumeration

What is NetExec? NetExec (formerly CrackMapExec) is a powerful “Swiss Army knife” tool for offensive security engagements, particularly useful for interacting with Active Directory (AD) environments. For someone learning about offensive security, here’s a quick summary of how to use NetExec in an engagement, focusing on SMB enumeration: NetExec is a command-line tool that automates Read More …

AZ 900 – Part III – Microsoft Entra ID

Microsoft Entra ID Overview What is Microsoft Entra ID? Microsoft Entra ID, formerly known as Azure Active Directory (Azure AD), is a cloud-based identity and access management service provided by Microsoft. It enables organizations to manage user identities and access to resources securely. Key Features of Microsoft Entra ID Identity Management: User Lifecycle Management: Entra ID Read More …

GRU – Gated Recurrent Units

Gated Recurrent Units (GRUs) are a type of recurrent neural network (RNN) architecture designed to address some of the limitations of traditional RNNs, particularly in handling sequential data. Introduced by Kyunghyun Cho and his colleagues in 2014, GRUs have gained popularity in various applications within artificial intelligence (AI), especially in natural language processing, time series Read More …

CNN – Convolutional Neural Networks

Convolutional Neural Networks (CNNs) were inspired by the way the human visual cortex works, CNNs are a specialized type of neural network particularly adept at analyzing and understanding images. They are the engine behind many impressive AI applications, from recognizing faces in photos to powering autonomous vehicles.  Traditional neural networks, while powerful, can struggle with Read More …

AZ 900 – Part II – Architecture & Security II

Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …

AZ 900 – Part II – Architecture & Security I

Microsoft Azure is a comprehensive cloud computing platform that provides a wide range of services, including computing power, storage, networking, databases, analytics, and more. Understanding its global infrastructure involves several key concepts: Regions and Availability Zones Regions: Azure is divided into geographic regions, which are clusters of data centers located in specific areas around the Read More …

AZ 900 – Part I – Microsoft Azure Cloud Concepts

Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …

Hacker Video – SIEGECAST: Kerberoasting & Attacks 101

Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Media walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

What is DTLS and where do I use it?

It’s best suited for small- to medium-sized businesses with deployments that range from tens to a few hundred computers. A provisioning package (. ppkg) is a container for a collection of configuration settings. Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows client. Windows Configuration Designer is primarily Read More …