Thomas Tech Blog โ€” Learning Log
๐Ÿ”Š ๐Ÿ”‹ 94% ๐Ÿ“ถ
๐Ÿ 
Home
๐Ÿ‘ค
About Me
๐Ÿ”ฌ
Labs
๐ŸŽฌ
Portfolio & Media
โœ๏ธ
Daily Posts
โœ‰๏ธ
Contact Me
// daily posts

Learning Log

Daily write-ups, TILs, and lab notes from my ongoing cybersecurity journey. Every session documented.

// streak active
Consistently learning,
consistently documenting.
STARTED JAN 2025
STREAK 18 DAYS
TOPICS 5 CATEGORIES
24
TOTAL POSTS
6
THIS MONTH
18
DAY STREAK
FILTER:
๐Ÿ”
Exploiting Kerberoastable Accounts in a Lab AD Environment
Walked through identifying SPN accounts, cracking TGS tickets offline with Hashcat, and how defenders can detect it. Deep dive into the full kill chain โ€” from enumeration with PowerView to offline cracking, and finally mapping detection logic in Elastic SIEM.
Building a Custom Sigma Detection Rule for Lateral Movement
Created a detection rule targeting SMB lateral movement via PsExec, tested against real lab traffic in Elastic SIEM.
Setting Up pfSense VLANs for Lab Network Segmentation
Documented isolating my homelab into attack/target/monitoring zones using pfSense VLAN tagging and firewall rules.
TIL: NTLMv2 Hash Capture via Responder on Internal Networks
Quick lab session capturing NTLMv2 hashes by poisoning LLMNR/NBT-NS requests, then cracking with Hashcat.
Malware Analysis: Unpacking a Basic Dropper Sample
Static and dynamic analysis of a dropper in REMnux โ€” examining strings, imports and extracting IOCs from the sample.
HTB Writeup: Privilege Escalation via SUID Binary
Full walkthrough of a HackTheBox machine focusing on SUID binary exploitation for local privilege escalation.
Threat Hunting with Elastic: Spotting Beacon Traffic
Used KQL queries in Elastic to hunt for C2 beacon-like patterns in my lab โ€” periodic connections, jitter analysis, and process trees.
BloodHound: Mapping AD Attack Paths from a Low-Priv User
Ran BloodHound against my AD lab to discover shortest paths to domain admin from an unprivileged domain account.
Analyzing a Phishing PCAP with Wireshark and Suricata
Dissected a malicious pcap file from Blue Team Labs Online โ€” tracked the full infection chain from email delivery to callback.
TIL: Pass-the-Hash Still Works Against Local Accounts
Tested Pass-the-Hash using Impacket's psexec.py against a non-domain machine โ€” worked even with the same local admin password.
Writing a Basic YARA Rule to Detect a Dropped Payload
Used strings and byte patterns from a dropper sample to build and test a YARA detection rule in a controlled environment.
CTF Writeup: Web LFI to RCE via Log Poisoning
Solved a boot2root machine by exploiting a Local File Inclusion vulnerability and poisoning Apache logs to achieve remote code execution.
๐Ÿ”
NO POSTS MATCH YOUR SEARCH