GOAD Cheat Sheet

GOAD writeups I’ve seen are outdated and several commands no longer work on current Kali builds. This post provides working, tested command examples that align with the latest tool versions and typical GOAD lab topologies. All examples were validated in a fresh Kali install. 1. Initial Network and Service Enumeration Read more

Nuclei

When it comes to automated vulnerability scanning, Nuclei is one of the best open source tools out there. It’s fast, flexible, and extensible with thousands of community templates. Masscan is like nmap on steroids. We’ll use it to enumerate HTTP, SSH, RDP, Active Directory, and SMB services, then feed those Read more

T-Pot

T-Pot is an open-source honeypot framework designed to emulate multiple attack surfaces and gather data on malicious activities. This blog post walks through the installation process on an Ubuntu 20.04 server, and demonstrates how to test its capabilities. Setting Up T-Pot System Requirements Installation Steps Follow the official installation steps Read more

Tailscale

Tailscale is a Zero Trust Network Access (ZTNA) solution that simplifies secure connectivity via a mesh VPN with Wireguard. It’s insanely easy to setup and get working. You get 3 devices with the free version. https://tailscale.com/pricing Setting Up Tailscale Inviting Users Configuring Access Controls Setting Up Applications and Services sudo Read more

Microsegmentation

Security breaches will continue to increase in sophistication. Microsegmentation addresses this by enabling granular controls over network traffic, enforcing intent based, workload aware policies at the application layer. This ensures that only the necessary communication between services can happen. Think least privilege/least access for network communications. In this post, I’ll Read more

SDLC 3: Quality Assurance

Quality assurance (QA) plays a vital role in the Software Development Life Cycle (SDLC), ensuring that the software meets defined requirements and performs reliably in various conditions. This post covers two essential quality frameworks within SDLC: the Software Testing Life Cycle (STLC) and the Defect Life Cycle. Software Testing Life Read more

IR 4: SEV Levels and MITRE ATT&CK

Introduction For a SOC, using structured frameworks like MITRE ATT&CK enhances incident detection and provides a clear methodology for tracking and understanding adversarial behavior. This post will cover the basics of operationalizing MITRE ATT&CK in a SOC environment and handling high severity incidents (SEV0). We’ll explore how MITRE ATT&CK improves Read more