2023  131

August  4

Incident Response - Best Practices and Techniques

Computer History: The Development of Programming Languages

Advanced Threat Hunting - Memory Forensics-Based Threat Hunting Techniques

Red Teaming - OSINT Techniques for Social Engineering

July  5

Cloud Security - Serverless Security Best Practices

Python - Advanced Python Debugging: Debugging Performance and Memory Issues

Computer History: The Role of Atari in the Home Computing Market

Advanced Malware Analysis - Dynamic Analysis Techniques

Cyber Threat Intelligence - Dark Web Analysis and TOR Investigations

June  22

IoT Security - Securing Smart Cities and Critical Infrastructure

Ruby - Rails Routing: Advanced Routing Concepts and Techniques

Computer History: The Birth of Gaming Consoles with the Release of the Nintendo Entertainment System

Advanced Threat Hunting - Fileless Malware Detection Techniques

Purple Teaming - Integrating Red and Blue Team Operations

Advanced Social Engineering - Vishing and Smishing

Python - Python Libraries for Data Science: Exploring Pandas, Numpy, and Other Popular Libraries

Computer History: The Emergence of Graphical User Interfaces and Windowing Systems

Advanced Memory Forensics - Malware Detection and Analysis

Cyber Threat Intelligence - Collection and Analysis Techniques

Advanced Web Application Security - Server-Side Request Forgery (SSRF)

Rust - Rust Memory Management: Advanced Concepts and Techniques

Computer History - The Development of CD-ROM Technology

Advanced Exploit Development - Return-Oriented Programming (ROP)

Cyber Threat Hunting - Techniques and Best Practices

Network Protocol Analysis - Wireshark and tcpdump

JavaScript - Advanced DOM Manipulation: Techniques for Manipulating the Document Object Model (DOM)

Computer History - The Role of the Commodore 64 in the Home Computing Market

Advanced Malware Analysis - Static Analysis Techniques

Red Teaming - Physical Security Bypass Techniques

Advanced Cloud Security - Serverless Security and Misconfiguration

Python - Object-Oriented Programming in Python: Advanced Concepts and Techniques

May  23

Computer History - Computing in the 1980s: The Development of the Apple Macintosh

Malware Obfuscation - Techniques and Best Practices

Cybersecurity Frameworks - NIST, ISO, and CIS

Wireless Security - Best Practices and Common Attacks

Metaprogramming in Ruby: Techniques for Writing Code that Writes Code

History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

Advanced Threat Hunting Techniques - TTP Analysis

Red Teaming - Scenario-Based Testing

Advanced Malware Analysis - Disassembly Techniques

Lua Programming Language - Basic Concepts and Syntax

Computer History - The Birth of the Intel x86 Architecture

Industrial Control System (ICS) Security - Best Practices and Common Vulnerabilities

Advanced Network Security - Application Layer Firewalls

Red Team Operations - Covert Channels and Exfiltration Techniques

PowerShell Scripting - Basic Concepts and Syntax

Computer History - The History of Apple Computers

Cyber Threat Intelligence - Best Practices and Techniques

Advanced Exploit Development - Heap Spraying Techniques

Blue Team Exercises - Threat Hunting and Incident Response

C++ Programming Language - Basic Concepts and Syntax

Computer History - The History of IBM and the Clone Wars

Advanced Memory Forensics - Analysis Techniques

Web Application Security - CSRF and XSS Prevention

April  25

BloodHound: Analyzing Active Directory for Security Risks and Attack Paths

Advanced Red Team Exercises - Supply Chain Attacks

Kotlin Programming Language - Basic Concepts and Syntax

Computer History - The Dot-Com Bubble

IoT Security - Best Practices and Common Vulnerabilities

Advanced Network Security - Intrusion Prevention Systems (IPS)

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Cloud Security - Best Practices and Common Vulnerabilities

C Programming Language - Basic Concepts and Syntax

Computer History - The History of Email

Exploit Development - Introduction and Techniques

Advanced Social Engineering Techniques - Spear Phishing and Whaling

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

Red Team Exercises - Simulating Real-World Attacks

Swift Programming Language - Basic Concepts and Syntax

Computer History - The Evolution of Video Games

Advanced Malware Analysis - Dynamic Analysis Techniques

Physical Security Testing - Techniques and Best Practices

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

Hacking IoT Devices - Techniques and Real-World Examples

Java Programming Language - Basic Concepts and Syntax

Computer History - The Birth of the Internet

Ransomware - Analysis and Prevention

Firewall Bypass Techniques - Tools and Best Practices

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

March  27

Advanced Web Application Attacks - CSRF and XXE

Go Programming Language - Basic Concepts and Syntax

Computer History - The Evolution of Computer Graphics

Memory Forensics - Analysis and Techniques

Social Engineering - Pretexting Techniques

Empire: A Comprehensive Red Teaming Framework Built on PowerShell

Advanced Network Attacks - DDoS and Botnet Techniques

Python Programming Language - Basic Concepts and Syntax

Computer History - The Y2K Bug and its Impact on Technology

Malware Analysis - Introduction and Basic Concepts

Password Cracking Techniques - Tools and Best Practices

PowerSploit: Using PowerShell for Offensive Security Operations

Phishing Attacks - Detection and Prevention

Efficient Web Development with Rails - Best Practices and Tips

Computer History - The Rise and Fall of Netscape Navigator

Buffer Overflow Exploits - Introduction and Exploitation

Red Teaming - Basic Concepts and Frameworks

Metasploit Framework: An Overview of the Open Source Penetration Testing Tool

Social Engineering - Techniques and Real-World Examples

Nim Programming Language - Basic Concepts and Syntax

Computer History - The Origins and Evolution of Unix

Reverse Engineering - Introduction and Basic Concepts

Network Scanning and Enumeration - Tools and techniques

Cobalt Strike Community Edition: Getting Started with the Open Source Red Teaming Tool

Web Application Security - Advanced SQL Injection techniques

Rust Programming Language - Basic concepts and coding practices

Computer History - A Brief History of the Computer Mouse

February  24

Cross-Site Scripting (XSS) Attack - Understanding and exploiting

Introduction to Penetration Testing - Basic concepts and methodology

Understanding macOS’s Unix Underpinnings for Linux Red Team Members

February 26, 2023 16 min

Psexec for Remote Code Execution

Using sc.exe on Windows for Remote Execution

Microcode - The Lowest Layer of Software Stack

Using DSQuery for Red Team: A Guide to Gathering Information on Active Directory Environments

Powerful Windows Systems Administration Command-Line Tools for Advanced Red Team Members

Transferring Data from MySQL Database with Docker, Mysqldump, and Pgloader.

Chisel - Tunneling Traffic with SSH over HTTP

Using xfreerdp and Pass-the-Hash for RDP Connection

Tunneling Traffic through a Network: Techniques for Combining Iptables Port Bends, SSH Tunnels, and Netsh Port Proxies

How to Use Impacket Example Scripts to Access Microsoft SQL Server from Linux

February 14, 2023 3 min

Using Impacket to Access Windows Shares from Linux

February 12, 2023 4 min

Basic Introduction to smbclient

February 10, 2023 9 min

Efficient Remote File Transfers: Using SCP and SSH with a Master Control Socket

February 9, 2023 12 min

Ruby Programming Language - Basic concepts and coding practices

Disabling Command History in Linux Shells for Red Team Operations

Alternate Data Streams on Windows NTFS: A Red Team’s Guide to Hiding and Detecting Hidden Data

Port Scanning on Linux and Windows

How to Install Impacket

Bash Scripting Language - Basic Concepts and Syntax

Computer History - The Rise and Fall of CP/M

Using WMIC for Red Teaming: A Guide for Pen Testers and Red Team Members

January  1

Initial Linux Enumeration - Best Practices and Techniques for Gathering Information about a Linux System