Piotr StachyraData Science for Blue Teaming— an Analysis of Windows Event Viewer LogsFiltering Event Viewer messages using cosine similarityJun 7, 2022Jun 7, 2022
Piotr StachyraTryHackMe : Active Directory — Throwback Network.Various TechniquesSep 24, 2020Sep 24, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers? — AnalysisThis article is a summary regarding exploitation of domain controllers on HackTheBox and CyberSecLabs platforms. For further information…Sep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?Hack The Box: SizzleSep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?Hack The Box: SaunaSep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?Hack The Box: Cascade.Sep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?Hack The Box: ResoluteSep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?Hack The Box: MonteverdeSep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?HackTheBox: ActiveSep 22, 2020Sep 22, 2020
Piotr StachyraActive Directory: What do CTF environments teach us about attacking Domain Controllers?CyberSecLabs: SecretSep 22, 2020Sep 22, 2020