Posts
Security write-ups, tool guides, and lab notes.
-
Experimenting with Claude Code CLI in the Home Lab
Teaching Claude to act as an internal pentester using Proxmox + Ludus + a custom NetExec skill. Lessons on structure, security hygiene, and AI-assisted report generation.
-
HackTheBox — Heist
IIS on 80, MSRPC on 135, SMB on 445, WinRM on 5985. Cisco config password crack chain leads to user via CME spray and privesc via Firefox memory dump.
-
HackTheBox — Bastion
Anonymous SMB share exposes a VHD backup. Mount it with guestmount, extract SAM hashes, crack with CrackStation. Privesc via mRemoteNG encrypted credential extraction.
-
Shodan CLI — Python
Using the Shodan CLI and Python library for external attack surface reconnaissance. Includes net-range searches, field parsing, and hostname-based queries.
-
US-CERT / CISA Alert TA18-074A Detection
Kansa PowerShell module targeting IOCs from the CISA TA18-074A Russian state actor advisory — RDP config, WDigest, password filters, backdoor accounts, SMBv1.
-
Kansa — Getting Started with PowerShell IR
Setup guide for Kansa, a modular PowerShell incident response framework for AD environments. Covers PSRemoting prereqs, execution policy, usage, and standalone module mode.
-
Web App Pentest Project Overview
Design framework for a governance-focused web application pentest program. Low-hanging-fruit OWASP scanning at scale with risk team integration.
-
Proposed Pentest Project Considerations
Requirements and tooling considerations for building an internal penetration testing program. MITRE ATT&CK aligned with AD, web, and physical test coverage.