
Suspicious USB
Today we will be tackling a task from BTLO called Suspicious USB. At the time of writing, the challenge is retired. This was fun tackling and and researching new stuff that i was well acquinted wit...
Today we will be tackling a task from BTLO called Suspicious USB. At the time of writing, the challenge is retired. This was fun tackling and and researching new stuff that i was well acquinted wit...
Scenario A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain. The traffic is coming from Sara’s computer, an Accountant...
Road Room Road Author StillNoob Difficulty Medium As usual, we first begin with a simple nmap scan to determine wha...
Today i’m going to be showing you how easy it is to have wordpress up and running using Docker Compose in an isolated environment built with docker containers. If you are not conversant with Docker...
In this walkthrough, i am going to show you how you can install docker on Ubuntu 20.04 in just 10 steps. However, minimal and cloud native OS are the preferred choice for a docker host since they a...
Hey there and welcome back. This is a continuation of my previous article, where we will look at some of the basic docker commands that should get you started and use docker with ease.But first, le...
PowerView.ps1 can be found here PowerView.ps1 can be downloaded here Documentation Official Documentation For more functions, check out: darkoperator/Veil-PowerView Some Awesome Cheat Sheets ...
Prerequisite Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob. ...
File Recovery and Data Carving with Foremost, Scalpel, and Bulk Extractor Foremost Foremost is a forensic program to recover lost or deleted files using a technique called data carving,based on t...