Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 23, 2023Advent of Cyber 2023 — Day 22 WriteupLearning Objectives Understanding server-side request forgery (SSRF) Which different types of SSRF are used to exploit the vulnerability Prerequisites for exploiting the vulnerability How the attack works How to exploit the vulnerability Mitiga...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 22, 2023Advent of Cyber 2023 — Day 21 WriteupLearning Objectives Understand how a larger CI/CD environment operates. Explore indirect poisoned pipeline execution (PPE) and how it can be used to exploit Git. Apply CI/CD exploitation knowledge to the larger CI/CD environment. Understanding C...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 21, 2023Try Hack me — Advent Of Cyber 2023 Day 20 Write UpLearning Objectives In today's task, you will: Learn about poisoned pipeline execution. Understand how to secure CI/CD pipelines. Get an introduction to secure software development lifecycles (SSDLC) & DevSecOps. Learn about CI/CD best practices....Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 19, 2023Advent of Cyber 2023 — Day 18 WriteupLearning Objectives In this task, we will: Identify the CPU and memory usage of processes in Linux. Kill unwanted processes in Linux. Find ways a process can persist beyond termination. Remove persistent processes permanently. Identifying the P...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 19, 2023TryHackme’s Advent of Cyber 2023 — Day 17 WriteupNetwork Traffic Data The network data is everywhere. It is all around us. Even now in this very task. Network communication and traffic are the natural behaviours of today's interconnected computing world. These behaviours represent a constant data f...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 19, 2023TryHackme’s Advent of Cyber 2023 — Day 16 WriteupLearning Objectives Complex neural network structures How does a convolutional neural networks function? Using neural networks for optical character recognition Integrating neural networks into red team tooling Introduction In today’s task, we’...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 17, 2023TryHackme’s Advent of Cyber 2023 — Day 15 WriteupLearning Objectives In this task, we will explore: Different steps in a generic Machine Learning pipeline Machine Learning classification and training models How to split the dataset into training and testing data How to prepare the Machine Learn...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 17, 2023Advent of Cyber 2023 — Day 14 WriteupScenario The CTO has made our toy pipeline go wrong. By infecting elves at key positions in the toy-making process, he has poisoned the pipeline and caused the elves to make defective toys! McSkidy has started to combat the problem by placing control...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 16, 2023Advent of Cyber 2023 — Day 13 WriteupLearning Objectives In today's task, you will: Learn to understand incident analysis through the Diamond Model. Identify defensive strategies that can be applied to the Diamond Model. Learn to set up firewall rules and a honeypot as defensive stra...Discusstryhackme
Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 16, 2023Advent of Cyber 2023 — Day 12 WriteupLearning Objectives Defence in Depth Basic Endpoint Hardening Simple Boot2Root Methodology As discussed earlier, we're dealing with a server that is vulnerable by design. It contains misconfigurations and has been implemented with poor or simpl...Discusstryhackme