Attack and Defense Strategies with MITRE ATT&CK Framework
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered automated and manual methods of scanning and cleaning a WordPress website infected with different types…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered the solution walkthrough of levels 01-19 of Nebula exploit exercises that let you practice your…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…
We covered the solution walkthrough of Basic pentesting 1 Vulnhub by introducing the basic steps and methodology…
We demonstrated the steps taken to perform penetration testing for Windows machine with Active Directory installed. We…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
We covered analyzing firmware images and scanning it for vulnerabilities and security misconfigurations using BugProve as an…
We covered the solution walkthrough of Moria Vulnhub by analyzing Wireshark Pcap file to extract a series…
We covered the first part solution walkthrough of Cyberry Vulnhub lab where we demonstrated port knocking. In…
We covered the solution of The Ether: Evil Science Vulnhub free lab by demonstrating Remote Code Execution…
We covered the solution of G0rmint Vulnhub lab by applying log file poisoning in a website based…
Description In the race for Vitalium on Mars, the villainous Board of Arodor resorted to desperate measures,…
We covered the solution for Depth Vulnub lab and covered command injection in JSP or known as…
We covered the first part solution to D0not5top Vulnhub lab by using a combinations of active information…
We covered the first part of Metasploitable 1 lab where we demonstrated Twiki exploitation and Linux privielge…
We covered the solution for C0m80 Vulnhub where we demonstrated the exploitation of Mantis bug tracker web…