-
MDM via Azure - Part 2 TOP NEW
MDM for iOS via Intune - Part 2 Goal: iOS devices enrollment to access O365 applications. The first part of MDM for iOS involved setting up the prerequisites, such as creating the certificate and the enrollment profile. To actually utilize these properties, we must create policies forcing these requirements upon users accessing O365 applicatio... Read More
-
MDM via Azure - Part 1 TOP NEW
MDM for iOS via Intune - Part 1 This is the first part of a 2-part write-up that will overview how I was able to set up MDM (mobile device management) through Intune. This project opened my eyes to the power of conditional access and MDM. Goal In order to secure BYOD devices, we will create several policies and profiles to create a secure envi... Read More
-
HTB Sherlocks - Litter TOP NEW
Introduction This is a write-up of a very fun HackTheBox Sherlock room. If you haven’t heard of HTB Sherlock rooms, they are meant to be on the defensive side of security. So instead of hacking, we are going to be analyzing attacks after an incident has occurred. Background Khalid has just logged onto a host that he and his team use as a testin... Read More
-
Building an Azure homelab TOP NEW
Background It’s hard to believe how much time has flown since my last homelab update. Stepping into my role as a cybersecurity engineer after graduating nearly a year ago has profoundly expanded my horizons in the tech sphere. With hands-on experience now supplementing my previous knowledge, I’m eager to delve into the recent enhancements I’ve m... Read More
-
LLMNR / NBT-NS Poisoning TOP NEW
LLMNR/NBT-NS Poisoning What is LLMNR? LLMNR stands for link-local multicast name resolution. It is used to resolve host names on local networks. The main fuction is to allow communication between hosts. LLMNR’s predecessor, NetBIOS or NBT-NS, is now outdated. This attack takes advantage of this protocol. When a user enters the name of a req... Read More
-
Building a virtual homelab TOP NEW
Why? Reading up on material and theory can be helpful, but there was only so much I was able to learn by studying network fundamentals and how vulerabilities are exploited. I needed to actually go out and experiment with these concepts. There are alternatives, such as tryhackme and hackthebox, but I wanted to also dig deeper; I wanted to creat... Read More