Linux Privilege Escalation | TryHackMe common priv esc
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered a very easy penetration testing challenge where we started with an Nmap scan followed by…
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
In this post , we covered an introduction to tactical detection where we used sigma rules to…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered the walkthrough of HackTheBox Surveillance where we demonstrated the exploitation of the recent vulnerability CVE-2023-41892…
In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to…
CTF Challenge Description: The challenge contains a php webproxy and a Tomcat server which has the Tomcat…
CTF Challenge Description: Hi there, thanks for testing my new notes app. I know it’s not done…
The map specified in the challenge statement is as follows. It signifies the location in which the…
We covered a wordpress XXE vulnerability CVE-2021-29447 that allows for sensitive files disclosure and server-side request forgery…
We covered using Snort to analyze FTP and HTTP traffic by creating and configuring the appropriate rules….
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered the solution walkthrough of levels 01-19 of Nebula exploit exercises that let you practice your…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….