Posts
Oste's Blog
Cancel
Network Analysis – Ransomware image

What is the operating system of the host from which the network traffic was captured? (Look at Capture File Properties, copy the details exactly) (3 points) To score this, you need to go the men...

Suspicious USB image

Today we will be tackling a task from BTLO called Suspicious USB. At the time of writing, the challenge is retired. This was fun tackling and and researching new stuff that i was well acquinted wit...

Network Analysis – Malware Compromise image

Scenario A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain. The traffic is coming from Sara’s computer, an Accou...

Road image

Road Room Road Author StillNoob Difficulty Medium As usual, we first begin with a simple nmap scan to determine wha...

Running Wordpress on Docker image

Today i’m going to be showing you how easy it is to have wordpress up and running using Docker Compose in an isolated environment built with docker containers. If you are not conversant with Docker...

Docker Installation image

In this walkthrough, i am going to show you how you can install docker on Ubuntu 20.04 in just 10 steps. However, minimal and cloud native OS are the preferred choice for a docker host since they a...

Docker Commands image

Hey there and welcome back. This is a continuation of my previous article, , where we will look at some of the basic docker commands that should get you started and use docker with ease.But first, ...

PowerView Walkthrough image

PowerView.ps1 can be found here PowerView.ps1 can be downloaded here Documentation Official Documentation For more functions, check out: darkoperator/Veil-PowerView Some Awesome Cheat Sheets ...

Easy peasy image

Prerequisite Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob. ...

File Recovery image

File Recovery and Data Carving with Foremost, Scalpel, and Bulk Extractor Foremost Foremost is a forensic program to recover lost or deleted files using a technique called data carving,based on t...