Tutorials, audio notes, YouTube drops and steal-this-template downloads. New things every week.
From a fresh laptop to four networked virtual machines you can attack and defend.
Read →Wireshark, filters, and the three columns that matter most.
Read →One domain controller, two users, and a group policy that locks it down.
Read →