A wee writeup about the SMB enumeration tool smbscan, which I had recently discovered on GitHub. The post introduces SMB, highlights the functionality of smbscan, and provides practical insights for uncovering hidden shares, finding sensitive files and auditing permissions.
A wee writeup of a security analysis of an LSC 1080P IP Camera sold by Action. The posts summarise multiple vulnerabilities we could identify including weak encryption of passwords, lack of authentication and inappropriate hardware hardening.
A wee writeup of an SQL injection vulnerability I had found within the open-source ChurchCRM CRM software. This vulnerability allows logged-in users to completely compsomise the database.
In this post, I’ll explain how Chromium’s Network Persistent State file can be utilised to recover SSIDs a suspect has previously been connected to.
In this post, I will look at the abundance of forensic artefacts which can be collected from Microsoft Teams Client on Windows Desktops.
In this post, I will look at the abundance of forensic artefacts which can be collected from Signal on Windows Desktops.
In this blog post, I will have a look at freely available APIs for searching flight tickets.
In this post, I will look at the abundance of forensic artefacts which can be collected from Viber on Windows Desktop.
In this post I will explain how I used a Nvidia Tesla T4 GPU rented from Google Cloud Platform to crack NTLM hashes using hashcat and John the Ripper at blazing speeds.
In this post I will present an API Documentation of the РЖД I had documented over at Postmans documenter and give an example how Python can be used to query data about Russian Railways.