Example reports

Please note: these documents were written in a scholastic environment and are provided for educational purposes only.

Michael Stolz
Apr 10, 2022

Research paper on Docker and Kubernetes best security practices:

  • Stolz docker and kubernetes security.pdf
  • download it here
  • MD5 hash: a7b628b2d7fdd335e1bdb4c4fc367030
  • SHA256 hash: 5595095d91d945584c8ea4f474cf2b2d57fb2ddf5269ea78a9546ece662b3166
  • Verified safe :) Virustotal

Pentest follow-up report:

  • Stolz pentest report.pdf
  • download it here
  • MD5 hash: 7c58460f2a147ecf7728e1985b78a9e1
  • SHA256 hash: a3c8cc09c717813d8800c8f869acb4002aac4aec9147377c2119c162b3601158
  • Verified safe :) Virustotal

Threat Intelligence paper on APT28

  • Stolz APT 28 TI.pdf
  • download it here
  • MD5 hash: e9aba83e452c763e745a12ff2a4b4c61
  • SHA256 hash: 8e40c604b799e8ea8fb420090fcbd8723177104aa03e519fb1dd007278028c51
  • Verified safe :) Virustotal

--

--

Michael Stolz
Michael Stolz

No responses yet