Michael WeeksApr 1, 20201 minIncident Response and Cloud ForensicsLooking forward to presenting for EC-Council on the 7th of April 2020 - Register Now: http://ow.ly/1Sii50z1MsU
Michael WeeksDec 6, 20192 minRemote Desktop Incident ResponseIt happened again, EC2 Abuse let you know you have a potentially compromised EC2 windows instance. You get into the account and there it ...
Michael WeeksAug 12, 20195 minSEC504 - Mentor-Class through SANSJust wrapped up my first swipe at teaching my first SANS course and I thought I'd share my experience for anybody else out there who may ...
Michael WeeksApr 21, 20192 minsinkhole - it's easier than you thinkThe longer I do this the more I come around to using simpler and simpler tools. Yes, learning GOLANG, kurbernetes, docker, AI, Blockchain...
Michael WeeksApr 10, 20192 minDetecting DCSHADOWI was lucky enough to get my ticket early to BSIDES AUSTIN this year and being the life of an Incident Handler I had to duck out of a few...
Michael WeeksFeb 9, 20192 minSSL Interception - or Training Your Admins to Cut-CornersMore and more Security vendors are moving to SSL interception on products. After pushing organizational certificates to browsers as Trust...
Michael WeeksJan 27, 20191 minKeep an Eye on Your DNS RecordsDNS Hijacking, Cache poisoning, and a host of other issues are a continued concern when it comes to internet hygiene. Amid the government...
Michael WeeksJan 4, 20192 minUserAgentBruteForceAfter taking FOR610 and taking the GREM I decided to try and write a tool or two that could be utilized for Malware Analysis. Some malwar...
Michael WeeksDec 19, 20182 minIncident Response Enables InnovationDraconian security controls, processes, and polices are stillborn or will be in the near-future. It will go the way of on-premise exchang...
Michael WeeksDec 13, 20188 minIntrusion Detection Using PowerShell1.Introduction 1.2 Microsoft in the late 90s and at the turn of the millennium was not held in high regard as it pertains to security. Mi...
Michael WeeksDec 13, 20181 minThreat Rigidity in Cyber SecurityFear Uncertainty and Doubt (FUD) works as an influence strategy by amateur cybersecurity professionals over an organization, and as a res...
Michael WeeksDec 13, 20181 minApplication White-listing with Bit9 ParityAntivirus is a requirement for a host of compliance standards and is championed to be a critical component for any security baseline (PCI...
Michael WeeksNov 19, 20181 minWelcome to packetaddict.com!Infosec, packets, technology and knowledge - all part of packetaddict.com. Here we want to share knowledge and ensure that other practiti...