Lateral Movement Tactics and Techniques

In this article I am going to talk about some of the Tactics and Tools that attackers can use when they have intruded into your network. The list below isn’t a full and definitive list of methods, but does highlight some of the more common methods that are seen when moving through a network. Powershell […]

Taking a look at Exchange Online Archiving

Office365 Email Archiving is included within the Office365 E3 suites (Which in turn is included within the M365 E3 Suite). Office365 Archiving effectively provides users with additional mailbox storage space and almost acts as a separate mailbox to the current mailbox. When archiving is enabled, the user will receive (Under the E3 License) an extra […]

Common User Password Profiler (CUPP)

Common User Password Profiler, also known as CUPP is a very useful tool on Kali. Essentially, it is a python script, capable of generating targeted wordlists on an individual, by collecting basic data on them.  Because CUPP is a python script, it therefore does not need to be installed, only downloaded and executed from terminal. Most […]

Next-Generation Security

As you have probably seen, every security product is going towards Next-Generation Security. For some, this is another marketing buzzword designed to turn heads and for others they know it as more advanced tools and features that build upon existing technologies. In this article, I will explain from my point of view what Next-Generation is […]

SPF, DKIM and DMARC Explanation

  If you have had the privilege of administrating and configuring email systems and the security of email systems then you have probably come across the terms SPF, DKIM and DMARC. In this post i will talk a little around these three tools and their importance in email security. Unfortunately, we are all familiar with […]

Cracking WiFi WPA/WPA2 using WiFite and Aircrack

Last Updated: 20/11/2024 So you’re interested in Hacking and Cracking? Or just want some free WiFi? Either way you have found the right place to start cracking WiFi. Today we are going to walk through the steps needed to crack WiFi access points using a combination of wifite and Aircrack-ng. In this guide we will […]

Enabling Hyper-V in Windows 10

Hyper-V is Microsoft’s Hypervisor and allows us to virtualize our hardware to create Virtual Machines on our devices. Virtualisation can take place not only on Servers but also client machines such as Laptops and Desktops, so long as they support virtualisation. Virtualization of Server based resources has become the norm in IT and therefor Creating […]