Privacy is sexy ππ
Introduction As a technology professional, I am agnostic when it comes to operating systems. The only thing I am concerned about is how the hardware and tools I use will help me be productive and ...
Introduction As a technology professional, I am agnostic when it comes to operating systems. The only thing I am concerned about is how the hardware and tools I use will help me be productive and ...
Category Cloud-Security, Kubernetes Security, LFI vulnerability Introduction Securing kubernetes cluster is a monumental task. There are a lot of things that needs to be considered for properl...
Introduction This is the continuation of part 1: creating a malware analysis lab locally. To recap in part 1 we setup a flare vm by mandiant and create an image as a vagrant box to be uploaded to ...
Introduction As I was doing a CTF based on detecting log4j attacks with ransomware khonsari recently I came across a lot of the hurdles of setting up forensic tools like Autopsy, pdfid, dotNet bas...
Point: 2000 Category Forensics, Reverse-engineering Challenge Details For the last week, log4shell vulnerability has been gaining much attention not for its ability to execute arbitrary comma...
Point: 850 Category OSINT - Open Source Intelligence Challenge Details You have been tasked by a client whose network was compromised and brought offline to investigate the incident and deter...
Introduction If you are using Mac and running Linux virtual machines on virtual box, you might have experienced slowness and lags compared to using VMWare Fusion. This blog is a quick fix to this ...
Introduction As security professionals, it could be very time consuming to spin up a kali machine with all the tools needed to do any form of Red or Blue team work like bug bounty, threat hunting ...
Point: 600 Category Cloud Security, Blue team, Incident Response Challenge Details Welcome, Defender! As an incident responder, weβre granting you access to the AWS account called βSecurityβ ...
Point: 100 Category Cryptography, Reverse-Engineering Question Can you crack the password to get the flag? Download the password checker here and youβll need the encrypted flag and the hash i...