top of page
Dave Gilmore's Tech Blog


How to hack a vulnerable web server and exfiltrate sensitive data
In today's blog post I am going to show how easy it is exfiltrate sensitive data from a vulnerable web server that has a misconfigured...
Oct 29, 20232 min read


Phishing Email Attack - Run Book and Playbook
For my university cyber-security course I was asked to produce a Run Book and Play Book to document a phishing email attach where the...
Oct 29, 20235 min read


I am voted Team Leader in the Retrospect_labs Taffe VS Taffe cyber challenge
I am absolutely delighted to have been voted in as team leader for the 2023 Cyber Challenge run by Retrospect_labs. The 2023 challenge...
Oct 21, 20231 min read


Finding hidden directories and files on a web application (Directory Traversal Attack)
In today's exercise I am going to attack a vulnerable web application to try and discover any hidden directories and files, who knows we...
Oct 15, 20232 min read


New Lab Time ! Kali and Metaspoiltable VM's
It's time for a new lab setup to practise some fundamental web app exploits. I have an Azure virtual lab running on my Mac with two...
Oct 12, 20231 min read


Basic Cyber Security Report for LetUsCount (fictional company report for university course)
During the first unit of my Cyber Security course at university I was asked to produce a basic cyber security report that would...
Oct 11, 20231 min read


Evaluation of Emerging Technologies for ASR Farms (University Project)
In today's post I am sharing a short presentation that I put together for my Cyber Security University course. You will need PowerPoint...
Oct 11, 20231 min read


Creating a web app in Python
I have become really interested in creating a web app and was about to embark on the journey of learning Javascript, which I may still...
Oct 7, 20231 min read


Let's Attack My Own Server with a Denial of Service !
In today's article I am going to demonstrate how I initiated a denial of service attack on my own Windows 2016 Server VM in order to...
Sep 23, 20232 min read


Key Features of a Network Access Control System (NAC)
For my university course I was asked to produce a single page infographic to show the main features of a network access control system:...
Sep 3, 20231 min read


Installing my own Windows Server and Active Directory so I can hack it
In my continued efforts to learn more about the Windows Server environment and in particular Active Directory I have installed 3 nested...
Aug 19, 20231 min read


Threat Intelligence with Wireshark
Happy Saturday morning to you, it's 7am and Im up already after a very heavy week at work cracking on with some more Try Hack Me rooms...
Aug 12, 20231 min read


Creating blob storage with Azure
Happy Saturday everyone :) Today I am continuing my Azure training, practising setting up blob storage with a new Azure VM. I have to...
Aug 5, 20231 min read


Catching up with Splunk
Over the past six months I have done a couple of online courses covering Splunk, but mainly theory based, so today I am tacking some of...
Jul 28, 20231 min read


Analysing Malicious Word Docs with Remnux
Today's task is analyse some malicious Microsoft Word files that have malicious code embedded. Using Vmoneky in Remnux I can extract...
Jul 12, 20231 min read
bottom of page