PowerGrid: 1.0.1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "PowerGrid: 1.0.1". It's available at VulnHub for penetration testing and you can download it from here.The merit of making this lab is...
View ArticleVULS- An Agentless Vulnerability Scanner
VULS is an open-source agentless vulnerability scanner that is written In GO Language for Linux Systems. For server Administrator having to perform software updates and security vulnerability analysis...
View ArticleFirefox for Pentester: Privacy and Protection Add-ons
In today’s article, we will facilitate ourselves with the skill of protecting us online. Firefox is a web browser developed by Mozilla. With its latest quantum update, it provides us with improved...
View ArticlePanabee: 1: Vulnhub Walkthrough
IntroductionToday we are going to crack this vulnerable machine called Panabee: 1. It is created by ch4rm. He is available on Twitter by handle aniqfakhrul. This is a Boot to root kind of challenge. We...
View ArticleFirefox for Pentester: Privacy and Protection Configurations
IntroductionThis is a second article in the series “Firefox for Pentester”. Previously we talked about how we can enhance the Privacy and Protection in Firefox using various add-ons and so, in this...
View ArticleInsanity: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "Insanity: 1". It's available at VulnHub for penetration testing and you can download it from here.The merit of making this lab is due to...
View ArticleDefense Evasion with obfuscated Empire
In this article, we will learn the technique of Defence Evasion using the PowerShell Empire. PowerShell Empire is one of my favorite Post Exploitation tools and it is an applaudable one at that.Table...
View ArticleTempus Fugit: 3 Vulnhub Walkthroughs
Today we are going to solve another boot2root challenge called "Tempus: 3". It's available at VulnHub for penetration testing and you can download it from here.The merit of making this lab is due to...
View ArticleFast Incident Response And Data Collection
In this article, we will gather information utilizing the quick incident response tools which are recorded beneath. All these tools are a few of the greatest tools available freely online. Through...
View ArticleSIEM Lab Setup: AlienVault
AlienVault OSSIM is an Open Source Security Information and Event Management (SIEM), which provides you the feature-rich open source SIEM complete with event collection, normalization, and correlation....
View ArticleAlienVault: End user Devices Integration-Lab Setup (Part 2)
As logs never lie, it’s very important to aggregate and analyze the internal and external network logs constantly so that you can prevent a breach or perform incident response on time. In the previous...
View ArticleMaskcrafter: 1.1: Vulnhub Walkthrough
IntroductionToday we are going to crack this vulnerable machine called Maskcrafter: 1.1. It is created by evdaez. It is a simple Boot to root kind of challenge. We need to get root privilege on the...
View ArticleForensic Investigation : Prefetch File
In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Everytime you do anything on your Windows system, a file is created. These files are called Prefetch files....
View ArticleForensic Investigation: Disk Drive Signature
In this article, we will be using Disk Drive Signature to identify any suspicious changes in systems’ directories or files. Creating such signatures can help us protect our data in various ways.Table...
View ArticleForensic Investigation: Pagefile.sys
In this article, we will learn how to perform a forensic investigation on a Page File. There is a lot of information that can be extracted from valuable artifacts through a memory dump.Yet, there is...
View ArticleAlienVault: OSSEC (IDS) Deployment
In this article, we will discuss of Deployment of OSSEC (IDS) agents to the AlienVault server.OSSEC is an open-source, host-based intrusion detection system (commonly called IDS) that market itself as...
View ArticleHA: Forensics: Vulnhub Walkthrough
IntroductionToday we are going to crack this vulnerable machine called HA: Forensics. This is a Capture the Flag type of challenge. It contains FOUR flags that are accessible as the solving of the lab...
View ArticleForensic Investigation: Shellbags
In this article, we will be focusing on shellbags and its forensic analysis using shellbag explorer. Shellbags are created to enhance the users’ experience by remembering user preferences while...
View ArticleMemory Forensics: Using Volatility Framework
Cyber Criminals and attackers have become so creative in their crime type that they have started finding methods to hide data in the volatile memory of the systems. Today, in this article we are going...
View ArticleKB-VULN: 3 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "KB-VULN: 3". It's available at VulnHub for penetration testing and you can download it from here.The merit of making this lab is due to...
View Article