What is the operating system of the host from which the network traffic was captured? (Look at Capture File Properties, copy the details exactly) (3 points) To score this, you need to go the men...
Dec 29, 2021 2021-12-29T00:00:00+03:00
Today we will be tackling a task from BTLO called Suspicious USB. At the time of writing, the challenge is retired. This was fun tackling and and researching new stuff that i was well acquinted wit...
Dec 28, 2021 2021-12-28T00:00:00+03:00
Scenario A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain. The traffic is coming from Sara’s computer, an Accou...
Dec 28, 2021 2021-12-28T00:00:00+03:00
Road Room Road Author StillNoob Difficulty Medium As usual, we first begin with a simple nmap scan to determine wha...
Dec 14, 2021 2021-12-14T00:00:00+03:00
Today i’m going to be showing you how easy it is to have wordpress up and running using Docker Compose in an isolated environment built with docker containers. If you are not conversant with Docker...
Dec 2, 2021 2021-12-02T00:00:00+03:00
In this walkthrough, i am going to show you how you can install docker on Ubuntu 20.04 in just 10 steps. However, minimal and cloud native OS are the preferred choice for a docker host since they a...
Dec 2, 2021 2021-12-02T00:00:00+03:00
Hey there and welcome back. This is a continuation of my previous article, , where we will look at some of the basic docker commands that should get you started and use docker with ease.But first, ...
Dec 2, 2021 2021-12-02T00:00:00+03:00
PowerView.ps1 can be found here PowerView.ps1 can be downloaded here Documentation Official Documentation For more functions, check out: darkoperator/Veil-PowerView Some Awesome Cheat Sheets ...
Dec 1, 2021 2021-12-01T00:00:00+03:00
Prerequisite Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob. ...
Dec 1, 2021 2021-12-01T00:00:00+03:00
File Recovery and Data Carving with Foremost, Scalpel, and Bulk Extractor Foremost Foremost is a forensic program to recover lost or deleted files using a technique called data carving,based on t...
Dec 1, 2021 2021-12-01T00:00:00+03:00