Linux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP Machine
We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts…
We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts…
We covered brief introduction to both types of cross site scripting vulnerability (XSS), reflected & stored xss,…
We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification…
We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact…
In this post, we demonstrated Laravel PHP CVE-2018-15133 and conducted privilege escalation by finding stored credentials. This…
We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed…
We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we…
We covered threat emulation using Caldera which is a popular tool that can be used to emulate…
We covered how to harden and secure Windows workstations from both the identity management and network side.This…
We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and…
We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a…
In this post, we covered the solution walkthroughs for two HackTheBox Sherlock challenges, which are, HackTheBox Campfire-1…
We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing…
We covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS…
We covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect…
We covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine…
We covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to…
We covered the first part of Android applications reverse engineering basics where we discussed file format of…
We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to…
We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web…