Insomni’Hack CTF Finals 2024 | Notes
CTF Challenge Description: Hi there, thanks for testing my new notes app. I know it’s not done…
CTF Challenge Description: Hi there, thanks for testing my new notes app. I know it’s not done…
The map specified in the challenge statement is as follows. It signifies the location in which the…
We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and…
We covered a cyber incident response case study that involved a malicious PDF malware delivered through a…
What is Infection Monkey? The Infection Monkey is an open-source security tool for testing a data center’s…
We covered and explained Wazuh as a SIEM and IDS/IPS solution along with its use case in…
We covered and explained Elastic stack that consists of Logstash, Elastic Search and Kibana. The three components…
We covered another case of Open Source Intelligence where we used investigated a domain name using different…
We covered an Open source intelligence case study starting from a Reddit username all the way to…
We briefly explained and discussed OSINT techniques and tools using practical scenarios that involve extracting public information…
We covered a wordpress XXE vulnerability CVE-2021-29447 that allows for sensitive files disclosure and server-side request forgery…
We covered different types of Nmap scans that can be used to evade Firewall and IDS detection….
We covered using Snort to analyze FTP and HTTP traffic by creating and configuring the appropriate rules….
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
Most Frequenty asked questions on How to Become Red Team Hacker & Penetration Tester answered by experts…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered an introduction to logging where we discussed the logic of creating logs and we analyzed…
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…