Featured

Hacking and DFIR Lab [Part 2 – DFIR]

In the last part, we were able to gain SYSTEM access to the Domain Controller giving us full access to the network. Let’s take a look at how the incident response process will go. The first step is detection. I installed a Logrhythm VM and spanned all network traffic from my PFSense VM to it. […]

Read More Hacking and DFIR Lab [Part 2 – DFIR]