How Password Spraying & ASREP Roasting Work in Windows Active Directory?
We demonstrated how password spraying and ASREP roasing attacks work agaisnt Windows Active Directory. ASREP Roasting is…
We demonstrated how password spraying and ASREP roasing attacks work agaisnt Windows Active Directory. ASREP Roasting is…
We covered the role of Junior security operations center analyst, the responsibilities and the required skills and…
In this video, we covered the incident response lifecycle with all its stages covered and explained. Incident…
In this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This…
We covered a newly-released challenge, named Summit, into the SOC level 1 track in TryHackMe. The challenge…
We covered one of the most popular wireless vulnerabilities, that is, WPS feature. Most wireless attacks that…
We covered the second phase of incident response, that is, identification & scoping or detection phase. In…
We covered the basic steps of a penetration testing procedure using a beginner friendly CTF challenge froom…
We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts…
We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification…
We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact…
In this post, we demonstrated Laravel PHP CVE-2018-15133 and conducted privilege escalation by finding stored credentials. This…
We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed…
We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we…
We covered threat emulation using Caldera which is a popular tool that can be used to emulate…
We covered how to harden and secure Windows workstations from both the identity management and network side.This…
We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and…
We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a…
In this post, we covered the solution walkthroughs for two HackTheBox Sherlock challenges, which are, HackTheBox Campfire-1…
We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing…