Inside a Modern Ransomware Campaign: Anatomy of a Multi-Stage Attack
A deep-dive into the infrastructure, tooling, and TTPs behind a recent ransomware campaign targeting UK-based organisations.
All Posts
Every post, write-up, and deep-dive — searchable and filterable below.
A deep-dive into the infrastructure, tooling, and TTPs behind a recent ransomware campaign targeting UK-based organisations.
How to systematically map privilege escalation paths in enterprise AD environments using custom Cypher queries.
Full write-up covering Kerberoasting, AS-REP roasting, and DCSync to achieve domain compromise.
Breaking down misconceptions around privacy tooling and building a realistic, layered approach for 2025.
Step-by-step walkthrough of a loader sample — import resolution, string obfuscation, and payload extraction.
A practical guide to authoring high-fidelity Sigma detection rules — reducing noise while catching what matters.
My write-ups for the stand-out challenges from this year's AoC, focusing on web exploitation and forensics tasks.
Using passive DNS, certificate transparency logs, and Shodan to pivot across adversary-controlled infrastructure.
Exploring business logic flaws, race conditions, and second-order injection patterns that automated scanners miss.