Inspecting packets/flows to identify protocols, anomalies, and potential issues.
Network Traffic Analysis
Windows Event Log Monitoring
Analyzing Windows logs to detect suspicious activity and anomalies.
ARP Spoofing
Lab demonstration of ARP spoofing to simulate a man-in-the-middle attack.
Network Hash Capture & Cracking
Capturing authentication material and testing cracking workflows in a lab setting.
RDP Brute Force & Remote Login
Demonstrating brute force and remote login of RDP in a lab environment.
Web Server Enumeration & Exploitation
Reconnaissance, service mapping, and exploitation on a lab web stack.
Active Reconnaissance
Probing targets and services to build a picture of the environment.
Raspberry Pi Web App Tinkering
Raspberry Pi–hosted web app for practice and experimentation.
NAS Security Attack & Defense Lab
TrueNAS lab: privilege escalation, detection, response, and hardening.