/images/my_image_2.png

Hacksafely

Hi, I’m Hacksafely — a security researcher and penetration tester. This is where I organize my notes, writeups, cheat sheets, and research findings on infosec topics like AD, phishing, SOC, bug bounty, and offensive tooling.

Learn more about me →

Azure Blob Container to Initial Access

Scenario Mega Big Tech has adopted a hybrid cloud architecture, utilizing both on-premise Active Directory and Azure cloud services. Given their prominence in the tech industry, they are concerned about potential security threats and have tasked your team with assessing the security of their infrastructure, including their cloud services. As part of this assessment, an intriguing URL surfaced in some public documentation, and you’ve been assigned the task of investigating it.

Hands-On Guide to Building a GOAD Lab with Wazuh and Tailscale Subnet Routing

Introduction In this tutorial, you’ll learn how to set up the GOAD (Game of Active Directory) lab using VirtualBox and Vagrant, and access it from another machine over Tailscale. This setup includes: Building the lab from scratch Adding the Wazuh detection extension Enabling Tailscale subnet routing Accessing the internal lab from a second system Optional SSH configuration between the machines Prerequisites To follow this guide, you’ll need: A Linux host system (e.