Squashe
Machine abstract This Linux machine exhibits misconfigurations in its NFS shares, enabling attackers to exploit user impersonation vulnerabilities. Such vulnerabilities allow malicious actors to up...
Machine abstract This Linux machine exhibits misconfigurations in its NFS shares, enabling attackers to exploit user impersonation vulnerabilities. Such vulnerabilities allow malicious actors to up...
Machine abstract This Linux machine presents a multi-layered challenge ripe for exploration. Initial access is granted through a static web page, concealing a hidden web server login accessed with...
Introduction SIEM(Security Information and Event Management system) is a tool that collects data from various endpoints/network devices across the network, stores them at a centralized place, and p...
Introduction What to learn here What is an EDR and why are they useful solutions Where an EDR like Wazuh is used Accessing Wazuh Navigating Wazuh Learning about Wazuh rules and alerts ...
Introduction The Simple CTF on TryHackMe is a perfect star8ng point for cybersecurity beginners. It’s a beginner-level Capture the Flag (CTF) that offers a thrilling challenge. You get to prac8ce s...
Comming soon …………….
The shell Wildcards Using wildcards (which is also known as globbing) allows you to select filenames based on patterns of characters. Commonly Used Character Classes Using wildcards makes it ...
Resources for this blog Fuzzy Security Guide 🔗 PayloadsAllTheThings Guide 🔗 Absolomb Windows Privilege Escalation Guide 🔗 Sushant 747’s Guide (Country dependant - may need VPN) 🔗 cours...
## Help links Basic Linux Privilege Escalation: 🔗 Linux Advanced Privilege Escalation: 🔗 Basics of linux🔗 Initial enumeration System Enumeration 1. Checking the kernel verison Checking...
Packet Filtering Capture Filter Syntax These filters use byte offsets hex values and masks with boolean operators, and it is not easy to understand/predict the filter’s purpose at first glance. T...