Getting the Most Value Out of the OSCP: The Exam

Getting the Most Value Out of the OSCP: The Exam

A practical guide to maximizing the short- and long-term benefits of your upcoming OSCP exam attempt(s).Disclaimer:All opinions expressed in this article are solely my own. I have reviewed the content to ensure ...
Hack for Show, Report for Dough

Getting the Most Value Out of the OSCP: The PEN-200 Labs

How to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success.Disclaimer:All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance ...
Getting the Most Value Out of the OSCP: The PEN-200 Course

Getting the Most Value Out of the OSCP: The PEN-200 Course

In this second post of a five-part series, I provide advice on how to best utilize the PEN-200 course material for a successful career in ethical hacking.Disclaimer:All opinions expressed in this article are ...
Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops

Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops

During red team operations, stealth is a critical component. We spend a great deal of time ensuring our payloads will evade any endpoint detection and response (EDR) solution, our traffic is obfuscated ...
Getting the Most Value out of the OSCP: Pre-Course Prep

Getting the Most Value out of the OSCP: Pre-Course Prep

The first post in a five-part practical guide series on maximizing the professional, educational, and financial value of the OffSec certification pursuit for a successful career in offensive cybersecurity consultingDisclaimer:All opinions expressed ...

Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations

The Praetorian Labs team was tasked with identifying novel and previously undocumented persistence mechanisms for use in red team engagements. Our primary focus was on persistence techniques achievable through modifications in HKCU, ...
Attacking Entra Metaverse: Part 1

Attacking Entra Metaverse: Part 1

This is part one in a two (maybe three…) part series regarding attacker tradecraft around the syncing mechanics between Active Directory and Entra. This first blog post is a short one, and ...

How to Proactively Harden Your Environment Against Compromised Credentials

The post How to Proactively Harden Your Environment Against Compromised Credentials appeared first on Digital Defense ...

Are You Prepared for Ransomware IRL?

The post Are You Prepared for Ransomware IRL? appeared first on Digital Defense ...
Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of BetaMythic 3.3 was released in a Beta six weeks ago, and since then there has been a bunch of feedback, not just about new Mythic 3.3 features but about the ...
OSZAR »