Categories
5 pages
Write-Ups
Active Directory Part 2 - Exploring GOAD Environment
Attacking Active Directory With Responder and NTLMrelayX
Secure File Storage
Forensics Using Volatility
Crosslock