Giovanni Pecoraro
Giovanni Pecoraro
Home
Posts
Projects
Talks
Publications
Contact
Light
Dark
Automatic
Posts
Brain stroke detection from CT scans via 3D Convolutional Neural Network
A tutorial on how to train a 3D Convolutional Neural Network (3D CNN) to detect the presence of brain stroke from Computer Tomography (CT) scans.
Giovanni Pecoraro
Apr 21, 2023
Deep Learning
,
Medical
,
Python
DICOM images in Python: An overview
A key step towards the application of Deep Learning to medical images is the understanding of Digital Imaging and Communications in Medicine (DICOM) which represents the standard for the communication and management of medical imaging.
Giovanni Pecoraro
Feb 23, 2023
17 min read
Deep Learning
,
Medical
,
Python
Windows Management Instrumentation cheatsheet
Windows Management Instrumentation (WMI) provides a unique interface to manage a local or remote network or computer and thus can be used by both Red and Blue Teams.
Giovanni Pecoraro
Sep 29, 2022
24 min read
Cyber Security
,
Red Teaming
Microsoft SQL Server cheatsheet
MSSQL Servers integrate right out the box with Windows and Active Directory Domains. Consequently, there are trust relationships wich we can be leveraged from an attacker perspective.
Giovanni Pecoraro
Sep 22, 2022
22 min read
Cyber Security
,
Red Teaming
Across Forests cheatsheet
Active Directory forests are the highest level of security boundary for network objects in the Active Directory tree and forest structure. Within this Active Directory hierarchy, a forest is considered the most important logical container in an Active Directory configuration.
Giovanni Pecoraro
Sep 15, 2022
2 min read
Cyber Security
,
Red Teaming
Across Domain Trusts cheatsheet
Trusts are relationships between domains or forests which allows users of one domain or forest to access resources in the other domain or forest.
Giovanni Pecoraro
Sep 8, 2022
3 min read
Cyber Security
,
Red Teaming
Domain Persistence cheatsheet
Domain persistence consists of techniques that adversaries use to maintain access the Active Directory environment across restarts, changed credentials, and other interruptions that could cut off their access.
Giovanni Pecoraro
Sep 1, 2022
7 min read
Cyber Security
,
Red Teaming
Mimikatz cheatsheet
Mimikatz is an open-source application that allows users to view and save authentication credentials such as Kerberos tickets. The toolset works with the current release of Windows and includes a collection of different network attacks to help assess vulnerabilities.
Giovanni Pecoraro
Aug 7, 2022
6 min read
Cyber Security
,
Red Teaming
Domain Privilege Escalation cheatsheet
Once an adversary has gained an initial foothold in the network, they will seek to escalate their privileges and compromise additional systems to locate sensitive data and other critical resources.
Giovanni Pecoraro
Jul 31, 2022
11 min read
Cyber Security
,
Red Teaming
Domain Lateral Movement cheatsheet
Lateral movement refers to the techniques that an attacker can use, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets.
Giovanni Pecoraro
Jul 24, 2022
7 min read
Cyber Security
,
Red Teaming
»
Cite
×