Daniel Edwards‘find’ command for ReconThere are a plethora of reconnaissance tools that can enumerate a system for all it’s secrets. However, as you’re progressing through your…Sep 10Sep 10
Daniel EdwardsBlue Teaming with Wazuh Pt 3: Detecing and Removing ThrVirusTotal IntegrationWazuh’s File Integrity Monitoring module allows us to connect to the Virus Total API, using it to scan files in our directories and…Dec 29, 2023Dec 29, 2023
Daniel EdwardsHackTheBox: TwoMillionHello everyone! Today I will be covering the TwoMillion challenge from HackTheBox. This machine is one of their retired boxes and as such…Sep 5, 2023Sep 5, 2023
Daniel EdwardsinSystem WeaknessBlue Teaming with Wazuh Part 2: Attacks & AlertsTable of ContentsAug 15, 2023Aug 15, 2023
Daniel EdwardsBlue Teaming with Wazuh The Open Source Security Platform: Part 1What’s going on everyone! Hope you all have been enjoying the Summer soaking in all those good vibes, getting outside and a enjoying a lil’…Aug 9, 2023Aug 9, 2023
Daniel EdwardsSSH: Connecting to GitHubHello everyone! Today we will be talking about using SSH to interact with your GitHub projects from the command line. The following will be…Aug 9, 2023Aug 9, 2023
Daniel EdwardsShhhhh 🤫: Hide Traffic with ProxychainsSo you’ve researched, purchased and installed your firewall, scoured the internet for the most reputable VPN eventually configuring one on…Feb 18, 2023Feb 18, 2023
Daniel EdwardsSigma Rule: PSExec Command ExecutionHello everyone! It’s been a while again and a lot has changed…again. I’ve recently taken an interest in sigma rules and Ansible. I have a…Feb 14, 2023Feb 14, 2023
Daniel EdwardsVulnhub: Photographer 1Good day Padawon Pentesters! Today I bring you a walkthrough for a boot2root box, Photographer 1. It was created with the intention to…Aug 9, 2020Aug 9, 2020