Setting up Metasploit as a Command & Control Server | TryHackMe Intro to C2 Servers
Introduction In order to better understand what a C2 framework is at its most basic level, think…
Introduction In order to better understand what a C2 framework is at its most basic level, think…
In this post, I have covered HackTheBox Cyber Apocalypse CTF 2023 Writeups in the form of written…
Introduction We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe….
Introduction We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which…
Introduction Microsoft’s Active Directory is the backbone of the corporate world. It simplifies the management of devices…
Pentesting Windows Active Directory with BloodHound | HackTheBox Forest | CREST CRT Track We covered HTB Forest…
Mounting VHD Files and Windows Privilege Escalation | HackTheBox Bastion | CREST CRT Track HackTheBox Bastion was…
Windows Privilege Escalation Through Runas | HackTheBox Access | CREST CRT Track HackTheBox Access was a simple…
HackTheBox Squashed Walkthrough | Linux Privilege Escalation Through X11 Authorization |CREST CRT Track Squashed uses a few…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs…
In this post, we covered HackTheBox Jerry as part of the beginner track in Hackthebox. We demonstrated…
In this post, we covered part 4 of Windows Persistence Techniques and particularly we covered scheduled tasks…
In this post, We covered the second part of the TryHackMe CTF collection Vol.1 challenge where we…
Introduction In this post, We covered most common Windows Privilege Escalation techniques as part of TryHackMe Windows…
In this post, We covered the third part of Windows Persistence Techniques and specifically we covered Backdooring…
Introduction In this post, We covered Cryptography and Steganography Challenges as part of TryHackMe CTF collection Vol.1…
Introduction In this post, we covered important web components such as load balancers, CDNs, Web application firewalls,…
Introduction In this post, we covered the second part of Windows Persistence Techniques and specifically we covered…
Introduction to Windows Persistence In this post, we presented Windows Persistence Techniques and specifically Account Tampering methods…