
NobisD
Explore -Latest posts
View allWho Stole the Szechuan Sauce? - Part 2
Full network investigation in an Active Directory environment. Detecting initial access, lateral movement, and more.
27/02/2026
Who Stole the Szechuan Sauce? - Part 1
Introduction to network DFIR using Zeek and JupyterLab
20/02/2026
RPC backdoor: implementing and detecting a backdoor
Hijacking a Microsoft protocol to turn it into a backdoor? In this article, focused on the Microsoft ecosystem, we'll see how to implement it and then detect …
22/01/2026