Attending CruiseCon 2025
A cybersecurity review of Ira Winkler's latest venture - real conversations and meaningful connections within the IT security community.
28 articles covering Python penetration testing, cybersecurity tools, vulnerability management, and industry insights.
A cybersecurity review of Ira Winkler's latest venture - real conversations and meaningful connections within the IT security community.
Bypassing MFA with session IDs - demonstrating how attackers can leverage session tokens to bypass multi-factor authentication in Microsoft 365 environments.
How to exfiltrate a Microsoft Teams clear text Auth Token - exploring security vulnerabilities in team collaboration platforms.
How I bypass MFA because open doors can be walked through - demonstrating vulnerabilities in MFA implementations.
Using PowerShell for penetration testing when endpoint security blocks traditional scanning tools.
How I use Python to gather juicy Microsoft Teams data - extracting sensitive information from collaboration platforms.
Moving internal files to an external Google Drive to show impact - demonstrating data exfiltration techniques.
Penetration testing as a strategic investment - demonstrating substantial returns for organizations through measurable risk reduction.
How I GitOut and move exploited internal data to GitHub with Python - demonstrating code repository exfiltration.
How I control multiple Docker containers and gather data - exploring container security vulnerabilities.
Using single sign-on and pyodbc to gather data across multiple databases - demonstrating database enumeration techniques.
Analyzing career stability in cybersecurity during economic downturns - demand for security professionals persists.
Discovering SQL databases on networks efficiently - automated database discovery techniques for penetration testers.
How I scan networks for vulnerable SMB shares using Python - identifying misconfigured file shares.
How I discover vulnerable services on Windows and Linux - automated service enumeration across platforms.
Techniques for finding hidden web applications and endpoints that organizations may not realize are exposed.
Combining Hashcat with Python automation for efficient password cracking during security assessments.
Gathering organizational intelligence through Outlook contact extraction for social engineering assessments.
Efficiently running multiple penetration testing scripts on multiple devices simultaneously for faster assessments.
Harvesting credentials through packet analysis - demonstrating network traffic interception techniques.
How to ingest Knowbe4 data to Splunk using HEC Tokens - integrating security awareness data with SIEM platforms.
Ingesting data from Knowbe4 PhishER into Splunk - building security data pipelines for better visibility.
Comprehensive review of Tenable.io for enterprise vulnerability management and security assessment.
A comprehensive review of tools and techniques for documenting and visualizing incident response workflows.
Understanding the risks of local admin access and strategies for implementing least privilege principles.
Guide to developing comprehensive vulnerability management policies for enterprise security programs.
Aligning vulnerability management with broader organizational risk management frameworks.
Evaluating project management approaches for multi-factor authentication implementation in security projects.
Follow me on Medium to get notified when I publish new articles about cybersecurity, penetration testing, and information security.
Follow on Medium