Demonstrating Black Box Penetration Testing | TryHackMe Relevant
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
In this post , we covered the concept of threat intelligence, how it’s performed and what are…
In this post , we covered an introduction to tactical detection where we used sigma rules to…
We covered the CVE-2023-41892 proof of concept that affected Craft CMS manually and with Metasploit framework. CVE-2023-41892…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered the walkthrough of HackTheBox Surveillance where we demonstrated the exploitation of the recent vulnerability CVE-2023-41892…
We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to…
In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to…
CTF Challenge Description: The challenge contains a php webproxy and a Tomcat server which has the Tomcat…
CTF Challenge Description: Hi there, thanks for testing my new notes app. I know it’s not done…
The map specified in the challenge statement is as follows. It signifies the location in which the…
We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and…
We covered a cyber incident response case study that involved a malicious PDF malware delivered through a…
What is Infection Monkey? The Infection Monkey is an open-source security tool for testing a data center’s…
We covered and explained Wazuh as a SIEM and IDS/IPS solution along with its use case in…
We covered and explained Elastic stack that consists of Logstash, Elastic Search and Kibana. The three components…
We covered another case of Open Source Intelligence where we used investigated a domain name using different…
We covered an Open source intelligence case study starting from a Reddit username all the way to…
We briefly explained and discussed OSINT techniques and tools using practical scenarios that involve extracting public information…
We covered a wordpress XXE vulnerability CVE-2021-29447 that allows for sensitive files disclosure and server-side request forgery…