RootSecRootSec
HomeAboutBlogToolsPublic Talks
RootSecRootSec
twittergithublinkedin
© 2026 RootSec

Blog

6 posts · security research and write-ups

InCTRL: Inside an Industrial Control System
ICSSCADA

InCTRL: Inside an Industrial Control System

Breaking down what actually makes up an ICS from PLCs and HMIs to the networks beneath them and understanding how they differ from traditional IT environments you are used to.

Apr 30, 2026
15 min read.
PhishCraft: Burning Less, Blending More
new
PhishingGoPhish

PhishCraft: Burning Less, Blending More

Focusing on GoPhish customisation and OPSEC by removing default settings, changing identifiers, refining behaviour, and adjusting how campaigns operate so they blend in better and don't get burned.

Apr 15, 2026
20 min read
PhishCraft: Building a Local GoPhish Lab
featured
PhishingGoPhish

PhishCraft: Building a Local GoPhish Lab

Setting up a local on-prem phishing lab in VMware using GoPhish, configuring a simple mail setup, and testing how campaigns and templates work before moving into more advanced infrastructure.

Apr 9, 2026
12 min read
SCCM Exploitation: Part 3 -  Reconnaissance and Enumeration
SCCMMECM

SCCM Exploitation: Part 3 - Reconnaissance and Enumeration

Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.

Sep 30, 2025
15 min read
SCCM Exploitation: Part 2 – Collections, Deployment, PXE
SCCMMECM

SCCM Exploitation: Part 2 – Collections, Deployment, PXE

Exploring SCCM’s collections, variables, task sequences, network access accounts, and PXE boot to understand the in-depth process behind deployment and operating system provisioning.

Aug 22, 2025
18 min read
SCCM Exploitation: Part 1 - Background & Architecture
SCCMMECM

SCCM Exploitation: Part 1 - Background & Architecture

Breaking down and understanding Microsoft SCCM’s architecture, core components, different deployment models, and client installation methods before diving deeper into exploitation later.

Aug 12, 2025
10 min read