<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CMNatic&#39;s Ramblings</title>
    <link>https://blog.cmnatic.co.uk/</link>
    <description>Recent content on CMNatic&#39;s Ramblings</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Mon, 28 Sep 2020 21:42:26 +0100</lastBuildDate><atom:link href="https://blog.cmnatic.co.uk/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Practical Malware Analysis Chapter 01</title>
      <link>https://blog.cmnatic.co.uk/posts/practical-malware-analysis-chapter-01/</link>
      <pubDate>Mon, 28 Sep 2020 21:42:26 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/practical-malware-analysis-chapter-01/</guid>
      <description>&lt;h1 id=&#34;1-introduction&#34;&gt;1. Introduction&lt;/h1&gt;
&lt;p&gt;Welcome to a rolling blog series of my writeups for the Practical Malware Analysis labs that everyone and their mum has done. Note, I&amp;rsquo;ll mostly be using different tools to that of the book for efficiency, practice and to keep things interesting.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll discuss the tools I use and my justification as I come to it in the labs. Without further ado, let&amp;rsquo;s get started.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>THM Overpass 2 - A Detailed Walkthrough Entirely With TShark</title>
      <link>https://blog.cmnatic.co.uk/posts/thm-overpass-2-entirely-with-tshark/</link>
      <pubDate>Mon, 28 Sep 2020 21:42:26 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/thm-overpass-2-entirely-with-tshark/</guid>
      <description>&lt;p&gt;&lt;img class=&#34;img-zoomable&#34; src=&#34;https://blog.cmnatic.co.uk/imgs/overpass-2/overpass-2-banner.png&#34; alt=&#34;overpass-banner&#34; /&gt;
&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://tryhackme.com/room/overpass2&#34; target=&#34;_blank&#34;&gt;Overpass 2 - Hacked&lt;/a&gt;, developed by &lt;a href=&#34;https://tryhackme.com/p/NinjaJc01&#34; target=&#34;_blank&#34;&gt;NinjaJc01&lt;/a&gt;, is the sequel to the Overpass series, however, with a DFIR feel and approach towards it. Fortunate for me, this room doesn&amp;rsquo;t require having completed the first - although I imagine some of the story is wasted on me.&lt;/p&gt;
&lt;p&gt;I decided to create a writeup this room in particular for a few reasons:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Forensics is always a welcome surprise to me&lt;/li&gt;
&lt;li&gt;It&amp;rsquo;s a great practice room for people who are familiar with network forensics - whilst being approachable for people who are new.&lt;/li&gt;
&lt;li&gt;A large majority of the recognised write-ups are &amp;ldquo;brain dumps&amp;rdquo; in my opinion, not explaining any logic or thought - but just stating fact. Which isn&amp;rsquo;t necessarily bad per se, but for walkthrough rooms there&amp;rsquo;s always just &lt;em&gt;that bit&lt;/em&gt; missing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I&amp;rsquo;ll be using &lt;a href=&#34;https://www.wireshark.org/docs/wsug_html_chunked/AppToolstshark.html&#34; target=&#34;_blank&#34;&gt;TShark&lt;/a&gt; - or terminal Wireshark and explaining my thoughts behind the process (filter commands included!)&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>My Reflections on Tryhackme&#39;s Throwback Lab (Spoilers)</title>
      <link>https://blog.cmnatic.co.uk/posts/my-reflections-on-tryhackmes-throwback-lab-spoilers/</link>
      <pubDate>Sun, 13 Sep 2020 03:52:31 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/my-reflections-on-tryhackmes-throwback-lab-spoilers/</guid>
      <description>&lt;p&gt;&lt;img class=&#34;img-zoomable&#34; src=&#34;https://blog.cmnatic.co.uk/imgs/throwback/throwback-banner.png&#34; alt=&#34;throwback-banner&#34; /&gt;
&lt;/p&gt;
&lt;p&gt;The following is my reflections and thoughts of TryHackMe&amp;rsquo;s brand new lab &amp;ldquo;Throwback&amp;rdquo;, the first implementation of their &amp;ldquo;Networks&amp;rdquo; system. &lt;strong&gt;Please prepare for spoilers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;I haven&amp;rsquo;t had the time nor opportunity to experience pentesting any sort of simulated network such as a Windows corporate environment, only on the sysadmin side of things - so this quite the journey.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>So I&#39;ve Graduated. Now What?</title>
      <link>https://blog.cmnatic.co.uk/posts/so-ive-graduated-now-what/</link>
      <pubDate>Mon, 31 Aug 2020 05:55:25 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/so-ive-graduated-now-what/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;A pertinent question I&amp;rsquo;ve asked myself for the last 12 months.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It&amp;rsquo;s quite the cliché thing to say that 2020 isn&amp;rsquo;t quite what anyone expected. And for someone who was already half-off the boat about Information Security, graduating in it was (and still is) daunting, especially considering the times.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>So You Want to Analyse Malware</title>
      <link>https://blog.cmnatic.co.uk/posts/so-you-want-to-analyse-malware/</link>
      <pubDate>Fri, 15 May 2020 15:51:51 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/so-you-want-to-analyse-malware/</guid>
      <description>&lt;h1 id=&#34;1-preface&#34;&gt;1. Preface&lt;/h1&gt;
&lt;p&gt;If you’re reading this, I think it’s fairly safe to assume your motivations for your own lab. When I started, I found it very hard to find up-to-date resources on beginning my interest. Granted, I had the precursory knowledge of tools and techniques that was explored throughout my University studies, making it much more approachable for me.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>THM Tony the Tiger (Creators Writeup)</title>
      <link>https://blog.cmnatic.co.uk/posts/thm-tony-the-tiger-creators-writeup/</link>
      <pubDate>Wed, 11 Mar 2020 17:39:01 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/thm-tony-the-tiger-creators-writeup/</guid>
      <description>&lt;p&gt;This fun-themed room has two point of entries, aimed at teaching you how to utilise a deserialization attack.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Exploiting Java Deserialization Windows Demo</title>
      <link>https://blog.cmnatic.co.uk/posts/exploiting-java-deserialization-windows-demo/</link>
      <pubDate>Fri, 06 Mar 2020 14:49:36 +0100</pubDate>
      
      <guid>https://blog.cmnatic.co.uk/posts/exploiting-java-deserialization-windows-demo/</guid>
      <description>&lt;p&gt;The following example is a write-up of an example of payload execution that I performed for a University assignment. I have also created a TryHackMe room based upon this. I replicate a java application and the serialization process; ultimately being able to perform RCE on Windows 10.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>
