Blog

Sharing insights in information security

Social Engineering with PowerShell Empire and gophish
Recovering HTTP Digest Authentication Hashes
GIAC Exploit Researcher and Advanced Penetration Tester
Hacking and Attacking WiFi networks
Extracting domain hashes from a ntds.dit
Offensive Security Certified Expert
Exploit Exercises - Protostar - Final levels
Exploit Exercises - Protostar - Heap levels
Exploit Exercises - Protostar - Network levels
Exploit Exercises - Protostar - Format String levels