YCZHURed Team Threat IntelThreat Intelligence (TI) or Cyber Threat Intelligence (CTI) is the information, or TTPs (Tactics, Techniques, and Procedures), attributed…Jul 10, 2023Jul 10, 2023
YCZHURed Team EngagementsLearn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.Jul 9, 2023Jul 9, 2023
YCZHUPost-Exploitation BasicsThis room will cover all of the basics of post-exploitationJul 5, 2023Jul 5, 2023
YCZHURetro CTFThere are two distinct paths that can be taken on Retro. One requires significantly less trial and error, however, both will work.Jun 27, 2023Jun 27, 2023
YCZHUDaily BugleCompromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.Jun 27, 2023Jun 27, 2023
YCZHUGame ZoneLearn to hack into this machine. Understand how to use SQLMap, crack some passwords, reveal services using a reverse SSH tunnel and…Jun 19, 2023Jun 19, 2023