SwitchDefense

CyberSecurity

CyberSecurity

Recent Posts

Using Registry Persistence Techniques

So, you're trying to figure out how attackers stick around on a computer after they've gotten in? A lot of it comes down to using the Windows Registry. It's like a central phone book for Windows,...

Using DNS for Data Exfiltration

Hey everyone, let's talk about something a bit technical but super important: using DNS for data exfiltration. You know, DNS is usually just for looking up website addresses. But, sneaky folks have...

Targeting Domain Controllers

So, you're looking into how bad actors go after domain controllers, huh? It's a big deal because these servers are like the keys to the kingdom in a Windows network. If someone gets control of them,...