Offensive practice is defensive training. Each writeup documents the full attack chain — enumeration to root — then flips perspective with a Defender's Lens: the MITRE ATT&CK techniques triggered, the Windows Event IDs or Sysmon events that fire, and the SIEM detection logic a SOC analyst would write to catch it.
Event ID 7045 and a DoublePulsar service install is the difference between a rule that catches WannaCry and one that doesn't.
CTF write-ups, machine walkthroughs, and lab notes are being added here. Check back soon for full coverage of CTF challenges and pentesting labs.
View All Labsprocess.parent.name:smbd AND process.name:(bash OR sh OR python)event.code:7045 AND winlog.event_data.ServiceFileName:*ADMIN$*Set-SmbServerConfiguration -EnableSMB1Protocol $false. Block port 445 inbound at perimeter. Network-segment legacy Windows systems.netdiscover -r 192.168.100.0/24.process.parent.name:httpd AND process.name:(bash OR sh) AND user.id:0http.request.uri:".git" AND http.response.status_code:200location ~ /\.git { deny all; }. Add .git to .gitignore in deployment pipelines. Never deploy with development artefacts in the webroot.event.code:4688 AND process.name:cmd.exe AND process.parent.name:services.exe AND user.name:"NT AUTHORITY\\SYSTEM"