VirtualBox VMs: Moving to and running from external drives
In a recent webinar someone said that it was impossible for him to set up the suggested lab environment because … More VirtualBox VMs: Moving to and running from external drives
In a recent webinar someone said that it was impossible for him to set up the suggested lab environment because … More VirtualBox VMs: Moving to and running from external drives
Edit 09/04/2021: Clarified installation instructions by adding explanation on how to install the YAML module. Edit 13/03/2021: Corrected reference for … More Script to check VirusTotal for many files and folders
Imagine one of your contractors usually does not need access to your AWS S3 buckets (or only access to buckets … More Use AWS Security Token Service (STS) to let low-privileged user temporarily assume privileged role in other account
Virtual machines are very useful not only on servers or in cloud environments, but also installed locally on a workstation … More Script to set up port forwarding, start/stop & automatically SSH into headless VirtualBox VM
An “interesting” part when working with APIs or runtime environments like containers is of course credential management. Somehow you have … More “Stealing the environment” – Insecure password injection in scripts and containers via environment variables
It’s very useful to be able to quickly perform some subnetting when given an IP address with its CIDR – … More Subnetting quick & easy
As I wrote in my last post on lateral movement, using AppLocker or Software Restriction Policies (SRPs) to avoid the … More SRPs block malware, but what if things stop working?
Recently on Twitter someone asked security professionals which tools they use most for their day-to-day tasks. Someone said “Excel” and … More Life-saving Excel shortcuts
As I explained in the previous post, NetworkMiner and Suricata are a great combination for performing quick and straightforward network … More Analyze Emotet and Trickbot with NetworkMiner and Suricata
Many people know Suricata as network intrusion detection (IDS) system, i.e. acting on live traffic; many people know NetworkMiner as … More Quick and easy setup for NetworkMiner and Suricata to perform network forensics