Detection Engineering: ELK Stack with Fleet
Intro Last month, my team and I participated in the CCDC competition – an exciting cyber defense challenge where teams
Read MoreIntro Last month, my team and I participated in the CCDC competition – an exciting cyber defense challenge where teams
Read MoreToday, we will be doing Gunship from HackTheBox which is labeled as an easy-level Web challenge that aims at teaching AST injection
Read MoreIn this blog post, I’ll take you through my hands-on exploration of common web vulnerabilities using the OWASP Broken Web
Read MoreBackground Previously, the common way for granting authenticated access to web applications was through the use of a username and
Read MoreAmbient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for
Read MoreFFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for
Read MoreThe cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the
Read MoreToday, we will be doing Undetected from HackTheBox which is labeled as an medium-level box that aims at teaching package misconfigurations, binary
Read MoreToday, we will be doing Doctor from HackTheBox which is labeled as an easy-level box that aims at teaching web enumeration, server
Read More