My PWPA Notes RepositoryHello there, me again. And more of my notes. I’ll try not to make a huge writeup as I did for my PJPT notes repository here, but no…Jan 27Jan 27
Initial Attack Vector: Cracking HashesSay we’ve used Responder to capture a hash. What now?Jan 27Jan 27
Initial Attack Vector: Capturing Hashes with ResponderResponder is an open-source, python-based LLMNR, NBT-NS, and MDNS poisoner.Jan 27Jan 27
Initial Attack Vector: LLMNR Poisoning & MitigationScenario: We have a client who wants an internal penetration testJan 27Jan 27
Notes about the Lab ArchitectureThis section is to help students who might have a hard time keeping track of the lab environment, especially the IP addresses. Since I will…Jan 27Jan 27
What is The Active Directory?Note: I got this information from the following site. I copied it to my notes because I found that it was very useful in helping me…Jan 27Jan 27
My PJPT Notes RepositorySome people use Git. I am not so savvy. I use Medium. I also write sometimes.Jan 27Jan 27
Should Writing Be Easy?There’s this poem by Charles Bukowski that triggers writers online to no end. It’s called ‘so you want to be a writer’, you can find it…Jun 24, 2021Jun 24, 2021
Why I’m Obsessed With This ImageI am a history fanatic. I can admit it. I will sit for hours and read dusty books and watch questionable quality documentaries on any and…Jun 24, 2021Jun 24, 2021