Featured Posts
Active Directory Hacking | Initial Enumeration
A brief guide to essential reconnaissance techniques for initial Active Directory enumeration, including NetBIOS, DNS, SMB, and LDAP scans
Recent Posts
Active Directory Hacking | Initial Enumeration
A brief guide to essential reconnaissance techniques for initial Active Directory enumeration, including NetBIOS, DNS, SMB, and LDAP scans
Introducing the Active Directory Ethical Hacking Series
Dive into my new blog series on Active Directory hacking, where I’ll guide you through essential tactics and procedures leveraged against Active Directory. Later, learn how these critical vulnerabilities work so that you can fortify your Active Directory defenses.
Keep Your Uptime High With AWS WAF DDoS Protections
DDoS attacks can cripple your site, but AWS WAF is your ally in maintaining uptime. Learn how to test and configure AWS WAF to fend off these attacks and keep your systems resilient.
Stop SQL Injections With WAF Managed and Custom WAF Rules
I’ll show you how to protect your web apps from SQL injections with AWS WAF. Learn how to use managed and custom rules to keep your apps secure.