top of page
Dave Gilmore's Tech Blog


How to hack a vulnerable web server and exfiltrate sensitive data
In today's blog post I am going to show how easy it is exfiltrate sensitive data from a vulnerable web server that has a misconfigured...
Oct 29, 20232 min read
Â


Phishing Email Attack - Run Book and Playbook
For my university cyber-security course I was asked to produce a Run Book and Play Book to document a phishing email attach where the...
Oct 29, 20235 min read
Â


I am voted Team Leader in the Retrospect_labs Taffe VS Taffe cyber challenge
I am absolutely delighted to have been voted in as team leader for the 2023 Cyber Challenge run by Retrospect_labs. The 2023 challenge...
Oct 21, 20231 min read
Â


Finding hidden directories and files on a web application (Directory Traversal Attack)
In today's exercise I am going to attack a vulnerable web application to try and discover any hidden directories and files, who knows we...
Oct 15, 20232 min read
Â


New Lab Time ! Kali and Metaspoiltable VM's
It's time for a new lab setup to practise some fundamental web app exploits. I have an Azure virtual lab running on my Mac with two...
Oct 12, 20231 min read
Â


Basic Cyber Security Report for LetUsCount (fictional company report for university course)
During the first unit of my Cyber Security course at university I was asked to produce a basic cyber security report that would...
Oct 11, 20231 min read
Â


Evaluation of Emerging Technologies for ASR Farms (University Project)
In today's post I am sharing a short presentation that I put together for my Cyber Security University course. You will need PowerPoint...
Oct 11, 20231 min read
Â


Creating a web app in Python
I have become really interested in creating a web app and was about to embark on the journey of learning Javascript, which I may still...
Oct 7, 20231 min read
Â


Let's Attack My Own Server with a Denial of Service !
In today's article I am going to demonstrate how I initiated a denial of service attack on my own Windows 2016 Server VM in order to...
Sep 23, 20232 min read
Â


Key Features of a Network Access Control System (NAC)
For my university course I was asked to produce a single page infographic to show the main features of a network access control system:...
Sep 3, 20231 min read
Â


Installing my own Windows Server and Active Directory so I can hack it
In my continued efforts to learn more about the Windows Server environment and in particular Active Directory I have installed 3 nested...
Aug 19, 20231 min read
Â


Threat Intelligence with Wireshark
Happy Saturday morning to you, it's 7am and Im up already after a very heavy week at work cracking on with some more Try Hack Me rooms...
Aug 12, 20231 min read
Â


Creating blob storage with Azure
Happy Saturday everyone :) Today I am continuing my Azure training, practising setting up blob storage with a new Azure VM. I have to...
Aug 5, 20231 min read
Â


Catching up with Splunk
Over the past six months I have done a couple of online courses covering Splunk, but mainly theory based, so today I am tacking some of...
Jul 28, 20231 min read
Â


Analysing Malicious Word Docs with Remnux
Today's task is analyse some malicious Microsoft Word files that have malicious code embedded. Using Vmoneky in Remnux I can extract...
Jul 12, 20231 min read
Â
bottom of page