Posts
2024
- » Threat Modeling on Unmanaged Mobile Devices: Protecting Corporate Data
- » Threat Hunting in Windows Endpoints - LoL Techniques
- » PowerPlay: The Dark Side of Power Automate Flows
2023
- » Analysing and investigating AnyDesk log files
- » Investigating TeamViewer log files
- » Effective API Security Strategy
- » Defending VMware vSphere from ransomware and other sophisticated attacks
- » Modern attack techniques in VMware vSphere Infrastructure
- » Credential scanning in AWS and Git environments
- » Hunting Mind Map
- » CVE-2022-26923
- » Active Directory Certificate Services:Modern Attack Paths, Mitigations, and Hardening
- » Threat Hunting in Microsoft 365 Environment
- » Exploitation of Misconfigured Certificate Templates
- » My First MITRE Contribution
- » Who owns your hybrid active directory ! Hunting for adversary techniques
- » Shared my thoughts on AD Security with Dark Reading journal