Pinnedb3lugaThe Planet’s Prestige — BTLO Challenge WriteupWe have an eml file after opening it on text editor & later opened in thunderbird to get a body view of the email.Jan 31Jan 31
Pinnedb3lugaSOC235 — Atlassian Confluence Broken Access Control 0-Day — CVE-2023–22515CVE-2023–22515Jan 30Jan 30
Pinnedb3lugaPhishing Analysis — LetsDefendYour email address has been leaked and you receive an email from Paypal in German. Try to analyze the suspicious email.Jan 29Jan 29
Pinnedb3lugaStreamlining Security: A Journey into Centralized Logging with syslog-ngIn the evolving cybersecurity landscape, the heartbeat of a safe and secure IT infrastructure is often reflected in the sound of its…Nov 25, 2023Nov 25, 2023
Pinnedb3lugaIntroduction to Network Analysis (SecurityBlueTeam) — Challenge WriteupWhat is the MAC address of the attacker?Oct 13, 20233Oct 13, 20233
Pinnedb3lugaIntroduction to Dark Web Operations — Course Capstone — WriteupChallenge ScenarioNov 5, 20232Nov 5, 20232
Pinnedb3lugainOSINT AmbitionIntroduction To OSINT (SecurityBlueTeam) - Challenge WriteupThe challenge report includes qns below:Oct 6, 20231Oct 6, 20231
b3lugaHow To Apply for Financial Aid in Coursera | 2024 — Google Cyber Security Professional CertificateEver wondered about how to take maximum advantage of Coursera’s Financial Aid program?Mar 181Mar 181