arzuyorusec.hashnode.dev·Nov 11, 2024MITRE: Defense Evasion: T1574.006Lab linki: https://learn.cyberexam.io/challenges/mitre/defense-evasion/mitre-defense-evasion-t1574-006 Görev Tanımı T1574.006 MITRE tekniği, tehdit aktörünün sistemde kalıcılık (persistence), yetki yükseltme (privilege escalation) veya savunma atlat...29 readsCyberexam MITRE | ATT&CK Learning Pathcyberexam
TATHAGATA ROYthreatradar.vercel.app·Sep 22, 2024Security Audit and Compliance Toolkit (Windows) – A Comprehensive Guide with Code WalkthroughIntroduction to Security Audit and Compliance Toolkit In today's digital landscape, ensuring the security and compliance of our systems is crucial. With threats ranging from unauthorized access to data breaches, organizations must regularly conduct s...75 readsSecurity
arzuyorusec.hashnode.dev·Sep 14, 2024Sudo Rights - Cyberexam Lab WriteupCyberexam Lab Link : https://learn.cyberexam.io/challenges/privilege-escalation/linux/sudo-rights Mission Statement Read the flag.txt file under the root directory (/) by increasing authority on the system. Solution What is the misconfigured applica...2 likes·28 readssudo rights
Andrew Tetzeliandrewtetzeli.hashnode.dev·Aug 10, 2024Student warned of vulnerability in Mobile Guardian MDM weeks before cyberattackUsing vulnerable security protocols and not following through adequately on warnings is bad. The experience should encourage better DevOps, at least. The warnings Weeks before the mass-wiping of students' devices because of an attack on Mobile Guardi...client-side privilege escalation
emmanuel amiekhameoshone.hashnode.dev·Jul 4, 2024Simplifying Linux User Administration: A Bash Script ApproachThe automation of creating linux users with their respective groups Table of contents overview prerequisites Input file format features script usage testing security Troubleshoot conclusion overview The create_users.sh script is designed to autom...Linux
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jun 20, 2024OSCP Journey : TJ_Null - HTB/SearchI - Introduction : Gaining the initial foothold for this box was a bit challenging, but once the process began, it became incredibly engaging. This box is an excellent example of a comprehensive Active Directory challenge and is a must-try. It covers...27 reads#cybersecurity
Niccolo Lampathedatalife.com·Mar 31, 2024Hack The Box - UnifiedThis article discusses the solution for Hack the Box Unified Challenge tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it your all until you feel th...85 readsCTF
Niccolo Lampathedatalife.com·Feb 12, 2024TryHackMe - Linux Privilege Escalation: Capstone ChallengeThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Capstone Challenge tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to ...182 readsCTF
Niccolo Lampathedatalife.com·Feb 11, 2024TryHackMe - Linux Privilege Escalation: SudoThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Sudo tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it your a...162 readsSecurity
Niccolo Lampathedatalife.com·Feb 11, 2024TryHackMe - Linux Privilege Escalation: Kernel ExploitsThis article discusses the solution for TryHackMe's Linux Privilege Escalation Kernel Exploits tasks so proceed with caution. I would suggest that you try to solve it on your own as you will learn a lot in the process of attempting. Try to give it yo...160 readspentesting