Hardening Windows 11 logon interface

A gate locked with chains and a padlock

The logon interface is one of the most used interfaces in Windows computers, yet it is also one of the most ignored attack vectors. In this post I would like to share some documented and undocumented tweaks to harden the Windows 11 logon interface.


Offensive threat modeling & IOC-proof ID generation

A drawing of police lineup of birds in suits

This the Part I of a two-part article, that talks about forensic and attribution resistant application of developmental tradecraft for offensive software development. In this first part, I am going to give some tips and examples on how to apply threat modeling methodology to development process and also share a simple technique that I have experimented with back when I researching fingerprinting-resistant data creation and storage methods.