Book Notes: Never Finished
“The world needs all of us to evolve into the very best version of ourselves. It is a moving target, not a one-time task. It is a lifelong quest for more knowledge, courage, humility, and belief...
“The world needs all of us to evolve into the very best version of ourselves. It is a moving target, not a one-time task. It is a lifelong quest for more knowledge, courage, humility, and belief...
Summary The Rhysida ransomware group uses phishing attacks to infiltrate their targets’ networks. They deploy payloads on compromised systems using tools like Cobalt Strike or similar command-and-...
Scenario Resolvn Threat Hunting Virtual Machine (RTHVM) The IT Security manager provided you with simulated malicious activity and has asked you to create hunting detection techniques for all of i...
Scenario The IT Security manager has asked your internal Penetration team to generate malicious PowerShell traffic in the environment and has now tasked you, the only Threat hunter, to create detec...
nmap -T4 -A 10.10.46.161 -Pn The Nmap port scan reveals open ports 80, 443, and 3398. Now, let’s begin investigating the web application. After inspecting the web application, we observed th...
Building your own portable Parrot Raspberry Pi is a good option if you want to do Wardriving, WiFi audits (with proper permission, of course), or simply have a cheap hacking station. This do-it-you...
When analyzing malicious Portable Executables (PE), the Import Address Table (IAT) holds significant importance from an analyst’s perspective. The IAT is a crucial component of the PE format that r...
Scenario: As a member of the Security Blue team, your assignment is to analyze a memory dump using Redline and Volatility tools. Your goal is to trace the steps taken by the attacker on the compro...
Hack into the scammer’s under-development website to foil their plans. Nmap Scanning Based on the findings from Nmap, it appears that ports 22, 80, 139, and 445 are open. Now, we can proceed ...
Scenario: As a SOC analyst, explore a collection of Wireshark pcap files that delve into various attack tactics, including evasion and lateral movement. Analyze network traffic captured within thes...