L. Dwayne SudduthUnified Kill Chain: THROUGH PhaseLateral Movement MITRE Tactic TA0008Nov 19, 2022Nov 19, 2022
L. Dwayne SudduthUnified Kill Chain: IN PhaseReconnaissance MITRE Tactic TA0043Nov 15, 2022Nov 15, 2022
L. Dwayne SudduthWindows Registry: System Information and AccountsUsing triage data that we have extracted from a target machine (typically a cloned copy of the hard drive) to perform forensics, we can…Oct 24, 2022Oct 24, 2022
L. Dwayne SudduthWindows Registry: Offline FilesOn a Live system, you will be able to access the registry by using regedit.exe, and you will be greeted with the standard root keys as…Oct 19, 2022Oct 19, 2022
L. Dwayne SudduthWindows RegistryThe Windows Registry consists of databases that contain system configuration data. This configuration data includes hardware, software, and…Oct 18, 2022Oct 18, 2022
L. Dwayne SudduthNetwork Fundamentals: TCP HandshakeWhen a TCP connection is established, it follows a process called a three-way handshake. This process uses SYN and ACK bits in the code…Oct 11, 2022Oct 11, 2022
L. Dwayne SudduthTryHackMe Pentest Room: Attacktive DirectoryWindows Active Directory runs more than 90% of the businesses around the globe. AD is notorious for shipping with unpatched…Oct 10, 2022Oct 10, 2022