10 Secure Coding Practices to Strengthen Your Software’s DefenseIntroduction: Securing your code is vital in today’s digital landscape, where cyber threats lurk at every corner. In this article, we’ll…Jul 31, 2023Jul 31, 2023
5 Steps to Secure Linux (protect from hackers)STEP 1 — Enable Automatic UpdatesJul 7, 2023Jul 7, 2023
Task 27 [Day 22] Attack Surface Reduction Threats are failing all around meTHM{4TT4CK SURF4C3 R3DUC3D}Dec 24, 2022Dec 24, 2022
Task 23 [Day 18] Sigma Lumberjack Lenny Learns New RulesWhat is the Challenge #1 flag?Dec 19, 2022Dec 19, 2022
Task 16 [Day 11] Memory Forensics Not all gifts are niceWhat is the Windows version number that the memory image captured?Dec 12, 2022Dec 12, 2022
Task 14 [Day 9] Pivoting Dock the hallsDeploy the attached VM, and wait a few minutes. What ports are open? 80Dec 12, 2022Dec 12, 2022