Decoding Radio SSTV and Audio Signals | Hardware Hacking P4 | HackTheBox Signals We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes. We had an audio file…
Hardware Hacking P2 | Logic Analyzers | HackTheBox Debugging Interface We covered another hardware hacking challenge where we demonstrated an analysis of an archived file that was created by capturing data off…
Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in…
Information Security Management Concepts Explained | TryHackMe We covered information security management concepts such as information security governance, information security regulations, risk…
The Pyramid of pain Explained | Threat Hunting | TryHackMe We covered The Pyramid of pain concept used in incident response and threat hunting which covers the artifacts of the attacker’s tools and…
Exploiting Pluck CMS and Linux Privilege Escalation | TryHackMe Dreaming We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version of Pluck…
Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a file upload…
Port Scanning and Information Gathering With Nmap and Nikto | TryHackMe Probe We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as Nmap and Nikto. We…
Bypassing File Upload Filters P5 | Upload Vulnerabilities TryHackMe We covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to exploit file upload vulnerabilities in…
Encyption and Cryptography 101 | TryHackMe Encryption — Crypto 101 We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption — Crypto 101 under complete beginner…
Incident Analysis with ELK Kibana | HTTP Logs Analysis | TryHackMe ItsyBitsy We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from a compromised Windows machine…
Redis NoSQL Database Exploit Using SSH | HackTheBox Postman We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of HackTheBox Postman