Foundational principles for building a strong, secure, and resilient environment.
Inspecting packets/flows to identify protocols, anomalies, and potential issues.
Analyzing Windows logs to detect suspicious activity and anomalies.
Lab demonstration of ARP spoofing to simulate a man-in-the-middle attack.
Capturing authentication material and testing cracking workflows in a lab setting.
Demonstrating brute force and remote login of RDP in a lab environment.
Reconnaissance, service mapping, and exploitation on a lab web stack.
Probing targets and services to build a picture of the environment.
Raspberry Pi–hosted web app for practice and experimentation.
TrueNAS lab: privilege escalation, detection, response, and hardening.