The Ransomware that helped its victim restore her files | TryHackMe Retracted
The video is a walkthrough of the Retracted room from TryHackMe, which focuses on a ransomware case…
The video is a walkthrough of the Retracted room from TryHackMe, which focuses on a ransomware case…
Introduction to Cookies The post explains the importance of cookies in web security and how to secure…
Introduction The Palo Alto Networks Cybersecurity Professional Certificate, offered on Coursera, is designed to provide learners with…
Introduction This post discusses the best cybersecurity certifications for 2024 such as OSCP, CISSP, COMPTIA Security+ and…
The video is a tutorial on how to use Wazuh for investigating cyber incidents. The video walks…
Introduction to TryHackMe Introductory Networking Networking is a critical aspect of cybersecurity and IT infrastructure. TryHackMe offers…
This post provides an in-depth discussion on the topic of offensive security, explaining its key concepts, job…
Introduction HackTheBox IClean begins with a basic cross-site scripting (XSS) attack to steal cookies, which is followed…
Introduction HackTheBox BoardLight is a web-based challenge from HackTheBox. This challenge typically focuses on web vulnerabilities, and…
Introduction The Computer Security and Systems Management Specialization offered on Coursera is a well-structured program designed to…
In this post, we provided a comprehensive explanation of OpenCTI, a cyber threat intelligence platform, to gather…
Introduction Proving Grounds Air Machine is an OSCP relatively new intermediate machine on Offsec Proving Grounds, which…
Introduction Priving Grounds Access Lab is a Windows domain controller, utilizing several notable techniques. If you’re studying…
Introduction HackTheBox Computational Recruiting challenge involves a typical cryptography and pattern analysis problem. The goal is to…
In this post, we covered malware analysis techniques and tools to analyze PDF and Microsoft office documents….
Introduction Hack The Box (HTB) “Regularity” challenge is a binary exploitation task involving a 64-bit statically linked…
This video is a tutorial on performing a network monitoring and social engineering attack simulation using a…
This post will contain a series of short articles with videos voice over to breifly go over…
Introduction HackTheBox Intuition begins with a series of websites focused on document compression. There’s an authentication site,…
For this Hack the Box (HTB) machine, I utilized techniques such as enumeration, user pivoting, and privilege…