Thomas Tech Blog β€” Firefox
πŸ”Š πŸ”‹ 94% πŸ“Ά
🏠
Home
πŸ‘€
About Me
πŸ”¬
Labs
🎬
Portfolio & Media
✏️
Daily Posts
βœ‰οΈ
Contact Me
OPEN TO OPPORTUNITIES

Welcome to
Thomas Tech
Blog

An IT professional documenting hands-on lab work, security research, and real-world techniques β€” built for learning, tracking daily progress.

thomas@ubuntu: ~/homelab
thomas@ubuntu:~$ whoami
Thomas β€” Cybersecurity Professional
thomas@ubuntu:~$ uname -a
Linux ubuntu 6.5.0-25-generic x86_64 GNU/Linux
thomas@ubuntu:~$ cat skills.txt
βœ“ Penetration Testing & Red Team Ops
βœ“ SIEM / SOC Blue Team Defense
βœ“ Active Directory Security
βœ“ Network Analysis & IDS/IPS
βœ“ Malware Analysis & Reverse Eng.
thomas@ubuntu:~$ systemctl status career
● career.service β€” Active: seeking opportunity
thomas@ubuntu:~$
πŸ‘¨β€πŸ’»
// about me

Passionate About Tech & Security

Hi, I'm Thomas β€” An IT professional with a genuine passion for technology in all its forms. I currently work in IT Support, where I've built a strong foundation in troubleshooting, systems administration, and delivering technical solutions that make a real difference for end users every day.

I'm actively seeking roles in Networking, System Administration, Cyber Security, Cloud & SOC analysis and other areas of tech where I can apply my hands-on skills to protect real organizations.

🐧 Linux
πŸͺŸ Windows AD
🎯 Pentest
πŸ”­ SIEM/SOC
🧬 Malware Analysis
🌐 Web Security
🐍 Python
🐚 Bash
πŸ‹ Docker
πŸ“‘ Wireshark
// homelab environments

My Lab Setups

Purpose-built environments for mastering specific cybersecurity domains through real hands-on practice.

🎯
🐧 KALI LINUX
Penetration Testing Lab
Full offensive environment with C2 infrastructure for practicing red team operations and exploitation.
MetasploitBurp SuiteNmapGobuster
πŸ›οΈ
⊞ WINDOWS SERVER
Active Directory Lab
Windows Server 2022 domain with misconfigurations for Kerberoasting, lateral movement, and AD attack paths.
BloodHoundImpacketMimikatzPowerView
πŸ”­
✦ MULTI-OS
SOC / SIEM Lab
Elastic SIEM with Wazuh and Suricata for blue team detection engineering and threat hunting.
ElasticWazuhSuricataSigma
🌐
🐧 UBUNTU
Web App Security
Docker-based vulnerable app stack (DVWA, Juice Shop) for OWASP Top 10 attack and defense practice.
DVWADockerOWASPFFUF
🧬
🐧 REMNUX
Malware Analysis
Air-gapped sandbox with REMnux & FlareVM for static/dynamic malware analysis and reverse engineering.
Ghidrax64dbgVolatilityCuckoo
πŸ›‘οΈ
🐧 PFSENSE
Network Defense
pfSense firewall with VLANs, Snort IPS, and Zeek for traffic analysis and perimeter security practice.
pfSenseSnortZeekVLANs
// portfolio & media

Projects & Media

Featured projects, write-ups, and lab captures β€” everything I've built, broken, and documented.

πŸ—ΊοΈ
AD Attack Path Lab
Full Windows domain with documented kill chain from initial foothold to domain compromise using BloodHound path analysis.
πŸ“Š
SIEM Detection Rules
Custom Sigma detection rules for common attack patterns deployed on Elastic SIEM with automated alerting and dashboards.
πŸ•·οΈ
Web App Vuln Research
Systematic OWASP Top 10 exploitation on DVWA & Juice Shop with full documentation and remediation recommendations.
πŸ”¬
Malware Analysis Report
Static and dynamic analysis of real malware samples in REMnux sandbox producing IOC report and YARA rules.
πŸ›‘οΈ
Network Segmentation Lab
Designed and documented a full VLAN-segmented homelab network using pfSense, including firewall rule logic and monitoring zones.
πŸ”‘
Password Cracking Research
Benchmarked Hashcat attack modes against various hash types and documented optimal wordlist and rule strategies.
πŸ†
CompTIA Security+
CompTIA
● ACTIVE
🎯
eJPT β€” Junior Penetration Tester
eLearnSecurity
● ACTIVE
πŸ”¬
Google Cybersecurity Certificate
Google / Coursera
● ACTIVE
🧠
OSCP β€” In Progress
Offensive Security
β—Œ IN PROGRESS
πŸ›‘οΈ
Blue Team Labs Online
Security Blue Team
● ACTIVE
οΌ‹
ADD CERT
// daily posts

Learning Log

Daily write-ups, TILs, and lab notes from my ongoing cybersecurity journey.

FEB 18, 2025
Exploiting Kerberoastable Accounts in a Lab AD Environment
Walked through identifying SPN accounts, cracking TGS tickets offline with Hashcat, and how defenders can detect it.
Read more β†’
FEB 15, 2025
Building a Custom Sigma Detection Rule for Lateral Movement
Created a detection rule targeting SMB lateral movement via PsExec, tested against real lab traffic in Elastic SIEM.
Read more β†’
FEB 12, 2025
Setting Up pfSense VLANs for Lab Network Segmentation
Documented isolating my homelab into attack/target/monitoring zones using pfSense VLAN tagging and firewall rules.
Read more β†’
FEB 09, 2025
TIL: NTLMv2 Hash Capture via Responder on Internal Networks
Quick lab session capturing NTLMv2 hashes by poisoning LLMNR/NBT-NS requests, then cracking with Hashcat.
Read more β†’
FEB 06, 2025
Malware Analysis: Unpacking a Basic Dropper Sample
Static and dynamic analysis of a dropper in REMnux β€” examining strings, imports and extracting IOCs.
Read more β†’
FEB 03, 2025
HTB Writeup: Privilege Escalation via SUID Binary
Full walkthrough of a HackTheBox machine focusing on SUID binary exploitation for local privilege escalation.
Read more β†’
// contact me

Let's Connect

Actively seeking cybersecurity opportunities. Whether you're a recruiter, hiring manager, or fellow enthusiast β€” let's talk.

I'm open to new opportunities and collaborations. Reach out through any channel β€” I typically respond within 24 hours.