<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Windows | RobWillis.info</title>
	<atom:link href="/tag/windows/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Sun, 09 Nov 2025 05:17:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Home Lab (2025)</title>
		<link>/2025/10/home-lab-office-2025/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 04 Oct 2025 23:10:14 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=7452</guid>

					<description><![CDATA[<p>It&#8217;s been a while since I&#8217;ve made a video, and even longer since I&#8217;ve shown my home lab setup! I&#8217;ve been doing some cleaning and thinking about upgrades, so I figured now would be a good time to show where everything currently stands.</p>
The post <a href="/2025/10/home-lab-office-2025/">Home Lab (2025)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Windows EDR: Telemetry &#038; Sensors &#8211; Mind Map</title>
		<link>/2025/09/windows-edr-telemetry-sensors/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 11:57:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[Internals]]></category>
		<category><![CDATA[Purple]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[team]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=7442</guid>

					<description><![CDATA[<p>I recently read Evading EDR by Matt Hand. While not a lengthy book, it&#8217;s technically dense and packed with tons of valuable information about Windows and EDR internals. It&#8217;s a fantastic resource, and I highly recommend it: Evading EDR by Matt Hand To help solidify my understanding of the concepts and apply them in future [&#8230;]</p>
The post <a href="/2025/09/windows-edr-telemetry-sensors/">Windows EDR: Telemetry & Sensors – Mind Map</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Analyzing &#038; Detecting IIS Backdoors</title>
		<link>/2022/11/analyzing-detecting-iis-backdoors/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 05 Nov 2022 08:00:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Extensions]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Web Shell]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=5452</guid>

					<description><![CDATA[<p>IIS Extensions As Backdoors Microsoft recently published an interesting blog explaining how they&#8217;ve noticed a new trend where attackers have been leveraging Internet Information Services (IIS) extensions to covertly backdoor Windows servers: https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/ The Microsoft post contains a wealth of information on this topic, but I really wanted to dig through the specifics in order [&#8230;]</p>
The post <a href="/2022/11/analyzing-detecting-iis-backdoors/">Analyzing & Detecting IIS Backdoors</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Defending Against PowerShell Attacks</title>
		<link>/2021/02/defending-against-powershell-attacks/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 04:07:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AppLocker]]></category>
		<category><![CDATA[CLM]]></category>
		<category><![CDATA[JEA]]></category>
		<category><![CDATA[Logging]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=4971</guid>

					<description><![CDATA[<p>It&#8217;s no secret that I am a big fan of PowerShell and recently I have been spending a considerable amount of time researching and testing it from a security perspective. While there is a lot of solid information out there, I have found it can still be a challenge to really get a solid grasp [&#8230;]</p>
The post <a href="/2021/02/defending-against-powershell-attacks/">Defending Against PowerShell Attacks</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Disabling PowerShell v2 with Group Policy</title>
		<link>/2020/01/disabling-powershell-v2-with-group-policy/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 20 Jan 2020 11:39:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[10]]></category>
		<category><![CDATA[2012]]></category>
		<category><![CDATA[2016]]></category>
		<category><![CDATA[2019]]></category>
		<category><![CDATA[Disable]]></category>
		<category><![CDATA[Dism]]></category>
		<category><![CDATA[DismOpenSession failed]]></category>
		<category><![CDATA[Downgrade Attack]]></category>
		<category><![CDATA[Error code = 0x80040154]]></category>
		<category><![CDATA[GPO]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[v2]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[WindowsOptionalFeature]]></category>
		<guid isPermaLink="false">/?p=4855</guid>

					<description><![CDATA[<p>In this post I am going to tackle something that I have been wanting to play around with for awhile, disabling PowerShell v2 at an enterprise scale. As a former systems engineer and now a security engineer, I have a love/hate relationship with PowerShell since it is amazingly useful but also incredibly dangerous in the [&#8230;]</p>
The post <a href="/2020/01/disabling-powershell-v2-with-group-policy/">Disabling PowerShell v2 with Group Policy</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Gathering Windows, PowerShell and Sysmon Events with Winlogbeat &#8211; ELK 7 &#8211; Windows Server 2016 (Part II)</title>
		<link>/2019/05/gathering-windows-powershell-and-sysmon-events-with-winlogbeat-elk-7-windows-server-2016/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Tue, 07 May 2019 02:43:19 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[2016]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Winlogbeat]]></category>
		<guid isPermaLink="false">/?p=4162</guid>

					<description><![CDATA[<p>In part I of this series, Installing ELK 7 (Elasticsearch, Logstash and Kibana) on Windows Server 2016, I covered the following: Installing and configuring Elasticsearch, Logstash, and Kibana as Windows services Installing and configuring Winlogbeat to forward logs from the ELK server into ELK Installing and configuring Curator as a scheduled task (optional) Now, in [&#8230;]</p>
The post <a href="/2019/05/gathering-windows-powershell-and-sysmon-events-with-winlogbeat-elk-7-windows-server-2016/">Gathering Windows, PowerShell and Sysmon Events with Winlogbeat – ELK 7 – Windows Server 2016 (Part II)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Installing ELK 7 (Elasticsearch, Logstash and Kibana) &#8211; Windows Server 2016 (Part I)</title>
		<link>/2019/05/installing-elk-7-elasticsearch-logstash-and-kibana-windows-server-2016/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Tue, 07 May 2019 02:42:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[2016]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Winlogbeat]]></category>
		<guid isPermaLink="false">/?p=4058</guid>

					<description><![CDATA[<p>I am a huge fan of the Elastic stack as it can provide a great deal of visibility into even the largest of environments, which can help enable both engineering and security teams rapidly triage technical issues or incidents at scale. There&#8217;s also the fact that unlike Splunk, the Elastic software is free to use [&#8230;]</p>
The post <a href="/2019/05/installing-elk-7-elasticsearch-logstash-and-kibana-windows-server-2016/">Installing ELK 7 (Elasticsearch, Logstash and Kibana) – Windows Server 2016 (Part I)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Manually Updating the Firmwares on a Dell PowerEdge R610</title>
		<link>/2018/12/manually-updating-the-firmwares-on-a-dell-poweredge-r610/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 24 Dec 2018 03:44:47 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[PowerEdge]]></category>
		<category><![CDATA[R610]]></category>
		<category><![CDATA[SLI]]></category>
		<category><![CDATA[Virtualization]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=4002</guid>

					<description><![CDATA[<p>Updating firmwares yet again&#8230; Shortly after the last time I posted on updating firmwares on Dell PowerEdge R610, I found out that Dell dropped support for all 11G servers from the SUU package along with the Lifecycle controller packages which basically broke the entire method I posted. However all hope is not lost, and the [&#8230;]</p>
The post <a href="/2018/12/manually-updating-the-firmwares-on-a-dell-poweredge-r610/">Manually Updating the Firmwares on a Dell PowerEdge R610</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Home Lab Cooling Upgrade!</title>
		<link>/2018/10/home-lab-cooling-upgrade/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 29 Oct 2018 03:24:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Cooling]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[pfSense]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3979</guid>

					<description><![CDATA[<p>In this video I show off my latest project &#8211; Upgrading the cooling system on my home lab in hopes of making it a little more efficient while quieting things down a bit. The original setup consisted of the following: 2 x 6&#8243; Ducts with Fans 6&#8243; Flexible Ducting Originally there was just a single [&#8230;]</p>
The post <a href="/2018/10/home-lab-cooling-upgrade/">Home Lab Cooling Upgrade!</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Apache Struts CVE-2018-11776 &#8211; Testing, Analyzing, &#038; Detection</title>
		<link>/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:49:06 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[CVE-2018-11776]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Pcap]]></category>
		<category><![CDATA[Struts]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[Tomcat8]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3843</guid>

					<description><![CDATA[<p>Intro Any time a new Apache Struts vulnerability comes out it should be taken pretty seriously as there are many &#8220;mission critical&#8221; systems that are leveraging the framework, with a considerable amount of them being public facing. Unfortunately, as a former Sys Ad I can tell you that many of these systems will go on [&#8230;]</p>
The post <a href="/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/">Apache Struts CVE-2018-11776 – Testing, Analyzing, & Detection</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
