0xUN7H1NK4BLECPTS- Everything You Need to KnowI recently achieved a significant milestone in my cybersecurity career: I passed the HTB Certified Penetration Testing Specialist (HTB…May 272May 272
0xUN7H1NK4BLEAmateursCTF- rev/volcanoThis is the write-up for amatersCTF’s rev/volcano, which had 500 points when I solved it.Jul 20, 20231Jul 20, 20231
0xUN7H1NK4BLEData Exfiltration Tips/TricksAs a security researcher, you have been hired to test the security of a company’s network. During your analysis, you discover a…Mar 24, 2023Mar 24, 2023
0xUN7H1NK4BLEAll you want to know about ffufThe term fuzzing refers to a testing technique that sends various types of user input to a certain interface to study how it would react…Mar 13, 2023Mar 13, 2023
0xUN7H1NK4BLEBenign TryhackmeWe will investigate host-centric logs in this challenge room to find suspicious process execution. To learn more about Splunk and how to…Dec 19, 2022Dec 19, 2022
0xUN7H1NK4BLEItsyBitsyIn this challenge room, we will take a simple challenge to investigate an alert by IDS regarding a potential C2 communication.Dec 19, 2022Dec 19, 2022
0xUN7H1NK4BLEInvestigating with SplunkSOC Analyst Johny has observed some anomalous behaviours in the logs of a few windows machines. It looks like the adversary has access to…Dec 19, 2022Dec 19, 2022
0xUN7H1NK4BLESignature Evasion : tryhackmeUsing the knowledge gained throughout this task, split the binary found in C:\Users\Student\Desktop\Binaries\shell.exe using a native…Dec 15, 20221Dec 15, 20221