Script to enumerate Windows events with name, ID, security monitoring recommendation, URL

When setting up and tuning a SIEM solution, you will write a lot of rules to detect well-known and arising … More Script to enumerate Windows events with name, ID, security monitoring recommendation, URL

Corona-induced home office: Bad for security, great for finding out who has an affair with whom

While the white-collar world was hastily relocating into the home office, IT departments were busy getting their hands on all … More Corona-induced home office: Bad for security, great for finding out who has an affair with whom

Reading encrypted network traffic & why connection coalescing, session resumption and perfect forward secrecy help

Wireshark is a very useful tool for network troubleshooting, but also for Blue (discover attacks) and Red (sniff secrets) security … More Reading encrypted network traffic & why connection coalescing, session resumption and perfect forward secrecy help

Run ARP poisoning attacks with Metasploit and detect them with Wireshark

ARP – the address resolution protocol – is responsible for translating IP addresses into MAC addresses. If your system wants … More Run ARP poisoning attacks with Metasploit and detect them with Wireshark

Get Alfa AWUS036ACH USB NIC running on Kali VM to attack wireless networks

For people in IT security who want to perform penetration testing on wireless networks, it is important to have a … More Get Alfa AWUS036ACH USB NIC running on Kali VM to attack wireless networks