Windows Machine Hacked With CVE-2024-49138 | Letsdefend SOC335 | SOC Training
In this post , we investigate a Windows machine that was compromised using a privilege escalation vulnerability…
In this post , we investigate a Windows machine that was compromised using a privilege escalation vulnerability…
The “Cyber Security 101” track on TryHackMe is an excellent starting point for individuals eager to delve…
Network forensics is an essential branch of cybersecurity that focuses on monitoring, analyzing, and investigating network traffic…
Introduction HackTheBox Spookifier presents a web application designed to generate spooky versions of user-provided names. However, the…
Introduction In HackTheBox Flag Command, we ffectively used enumeration, DevTools, and JavaScript analysis to bypass the normal…
This post walks through the investigation of a security incident case named SOC336 using letsdefend.io, specifically analyzing…
Introduction Linux forensics is an essential part of digital investigations, focusing on analyzing system activity, identifying security…
Gobuster is a popular tool for web enumeration and penetration testing, used to discover directories, subdomains, and…
Introduction In HackTheBox Strutted, we begin by identifying an Apache Struts vulnerability through enumeration. By crafting a…
This post provides a detailed step-by-step breakdown of analyzing a real-world phishing campaign named #.Foxwhoops. It demonstrates…
The post is a walkthrough of a digital forensics investigation on a Windows system through a lab…
This article is a walkthrough of the “Alfred” machine on TryHackMe, part of the Offensive Security pathway….
Introduction This post is a follow-up tutorial focused on Linux privilege escalation, part of a penetration testing…
Introduction In this article walk-through, we covered reverse engineering an executable file with Ollydbg to reveal the…
This article delves into various network security protocols across different OSI model layers, emphasizing their roles in…
This article provides an in-depth exploration of fundamental networking protocols, including DHCP, ARP, ICMP, and routing protocols…
This article provides a comprehensive overview of fundamental networking concepts, essential for anyone delving into cybersecurity and…
Introduction This post explores career advancement options and certifications for cybersecurity professionals who have obtained the Offensive…
This post is a tutorial on the basics of using TCPdump, a command-line packet capturing tool commonly…
Cybersecurity is an ongoing battle between ethical hackers (white hats) and malicious hackers (black hats). As cyber…