Shuvro HawkUnderstanding the Cyber Criminal Elite: Insights from OffSec TH-200 Course module 2 section 3In the world of cybersecurity, Advanced Persistent Threats (APTs) stand as some of the most sophisticated and dangerous adversaries. Often…4d ago4d ago
Shuvro HawkRansomware Actors and Their Strategies: Insights from OffSec TH-200 Course module 2 section 2Continuing from my OffSec TH-200 journey…6d ago6d ago
Shuvro HawkUnderstanding Threat Actors: Insights from OffSec TH-200 Course module 2 section 1As I continue my journey through the OffSec TH-200 course, I’ve now reached Module 2, Section 1, which delves into some critical areas of…6d ago6d ago
Shuvro HawkExploring Threat Hunting: Insights from OffSec TH-200 Course module 1As cybersecurity threats evolve and become increasingly sophisticated, organizations must adopt proactive measures to safeguard their…Sep 18Sep 18
Shuvro HawkPicoCTF — SOAPThis challenge, titled SOAP, from the web exploitation category on picoCTF, appears to center around an `XXE` (XML External Entity)…Sep 13Sep 13
Shuvro HawkPicoCTF — tricksterThe picoCTF ‘trickster’ challenge involves uploading PNG files on a web application. After successfully uploading a PNG image, the user…Aug 15Aug 15
Shuvro HawkTryHackMe — Practical Example of OS Security WriteupIn this task, we will try to hack into a Linux system.Jun 15Jun 15
Shuvro HawkHack The Box — RedeemerThis walkthrough is for the last `free` HTB starting point box which is titled as redeemer.Jun 6Jun 6
Shuvro HawkHack The Box — DancingThis is the third box from the Hack The Box starting point module, and this one is called "dancing.” Let’s dive into it. Upon spawning the…May 14May 14
Shuvro HawkHack the Box — FawnThis writeup covers walkthrough of another HTB “Starting Point” machines entitled as “Fawn”.May 12May 12