WALK THROUGH: HACK THE BOX: TIMELAPSE

Timelapse is a Windows Active Directory machine. I have very little experience with Windows and AD, so this was a great learning experience for me. I learned about Evil-WinRM, Crackmapexec, and LAPS. In this box, we start with enumeration to gain access to an SMB share that gives us a password protected winrm backup zip…

Continue reading →

WALK THROUGH: HACK THE BOX: PAPER

Paper was written by Secnigma and is an homage to one of the greatest TV series of all time, The Office! Enumeration (like most things) is key to rooting this box. Enumeration using various tools is important to gain the initial foothold. Next, enumeration of a WordPress site gives you access to secret information. Using…

Continue reading →

Internet of Threats: Cyber Intelligence and Everything It Touches

On October 8th, 2019, I attended a small seminar on cyber intelligence hosted by the Armed Forces Communications and Electronics Association (AFCEA) at the Hawaii Convention Center. My NCOIC and I, both Army Signaleers, made the early drive down for a chance to network over breakfast and learn about an ever-evolving field that continues to…

Continue reading →