CSandkerinSSE BlogAttacking Microsoft Configuration Manager (SCCM/MECM)The Microsoft Configuration Manager (ConfigMgr) is an on-premise software management solution to deploy, configure and update managed…May 17, 20231May 17, 20231
CSandkerinSSE BlogOffphish — Phishing revisited in 2023What is the state of the art with phishing in 2023? What techniques do exist, which do still work and what is know-how worth revisiting?Feb 9, 2023Feb 9, 2023
CSandkerinSSE BlogActive Directory Spotlight: Windows Event Forwarding & Windows Event CollectorWindows Event Forwarding has been around for 20 years and has since then been underestimated in its role to make use of log events for…Jul 27, 2022Jul 27, 2022
CSandkerinSSE BlogAdvisory and Exploitation: The MELAG FTP ServerDuring an engagement in early 2021 we stumbled across an FTP server with a banner that we’ve never seen before…May 5, 2022May 5, 2022
CSandkerinSSE BlogActive Directory Spotlight: Trusts — Part 2. Operational GuidanceIn the first part of this Active Directory (AD) spotlight I introduced the mechanics of Active Directory Trusts and highlighted what a…Aug 10, 2021Aug 10, 2021
CSandkerinSSE BlogActive Directory Spotlight: Trusts — Part 1. The MechanicsThis spotlight is intended to shed some light on Active Directory Trusts, the value they bring, the risk they can contain and how to…Aug 10, 2021Aug 10, 2021