Skip to content
Bleekseeks

A Cyber Security Blog.

  • LinkedIn
  • Twitter / X
How to check Shared mailbox’s Access Rights via Powershell
Posted inBlog

How to check Shared mailbox’s Access Rights via Powershell

How to check Shared mailbox’s Access Rights via .csv with Powershell. Useful for checking permissions without having to go through the office.com admin/exchange interface.

Read More
March 7, 2023
NoVNC and Browser In The Browser Phishing attack POC/Explained
Posted inBlog

NoVNC and Browser In The Browser Phishing attack POC/Explained

Combining two advanced phishing techniques

Read More
December 19, 2022
Browser In The Browser (BITB) Attack – POC
Posted inBlog

Browser In The Browser (BITB) Attack – POC

Browser In The Browser (BITB) phishing attacks are less common but very effective when used. They’re hard to identify and easy to setup!

Read More
October 13, 2022
Project – Tor Middle Relay
Posted inBlog

Project – Tor Middle Relay

Tor is used for browsing the internet anonymously, I setup a middle relay to assist with this!

Read More
July 7, 2022
Project – Honey Pot
Posted inBlog

Project – Honey Pot

Honeypot project to gain an insight on how many attacks happen, which countries and what services.

Read More
July 7, 2022
Project – OVH Lab Environment
Posted inBlog

Project – OVH Lab Environment

Where it all begins - a test environment

Read More
July 7, 2022
How to deploy AutoElevate via Azure/Intune
Posted inBlog

How to deploy AutoElevate via Azure/Intune

How to deploy AutoElevate via Intune using Endpoint manager

Read More
November 18, 2021
My first BurpSuite Vulnerability using Intercept
Posted inBlog

My first BurpSuite Vulnerability using Intercept

My first time using BurpSuite Intercept and I found a vulnerability which allows me to change the price of items and checkout.

Read More
November 12, 2021
Force Outlook for Mobile via Conditional access
Posted inBlog

Force Outlook for Mobile via Conditional access

How to force mobile devices to use the Outlook App instead of their native apps.

Read More
June 11, 2021
How to access Attack simulation training (PREVIOUSLY Attack Simulator) within Office 365
Posted inBlog

How to access Attack simulation training (PREVIOUSLY Attack Simulator) within Office 365

Microsoft has a habit of constantly changing the location of items within the Security center…
Read More
June 11, 2021

Posts pagination

Previous page 1 2 3 Next page
Scroll to Top