Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Nov 25, 2024TryHackMe (THM): Search SkillsThe Search Skills room is designed to help you develop efficient Internet searching techniques. Knowing how to locate relevant and accurate information is critical in cybersecurity. This room covers essential skills such as evaluating search results,...CTFs | Write-ups | Walk-throughOSINT (Open-Source Intelligence)
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Nov 24, 2024TrtyHack Me (THM): Defensive Security IntroThe "Defensive Security Intro" room introduces essential concepts and practices of defensive cybersecurity. Unlike offensive security, which focuses on finding and exploiting vulnerabilities, defensive security prioritizes preventing attacks, detecti...CTFs | Write-ups | Walk-throughdefense security
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Nov 24, 2024TryHackMe: Passive Reconnaissance- WriteupIn this room, we will delve into the first module of Network Security, focusing on Passive Reconnaissance. The module covers several vital areas, but here, we will focus on passive reconnaissance tools and techniques, such as whois, nslookup, dig, an...CTFs | Write-ups | Walk-throughthm passive reconnaissance
Terminal Intelligence Securityterminalintelligencesecurity.hashnode.dev·Mar 10, 2024Perfection HTB WriteupDuring enumeration, it was noticed that Input validation bypass refers to exploiting weaknesses in an application’s validation checks to submit malicious data that bypasses intended restrictions. Attackers use techniques like filter evasion, context ...1.5K readsPerfection-walkthrough,
Debugsdebugs.hashnode.dev·Jan 4, 2024THM- Active Directory BasicsActive Directory Basics Learn the basics of Active Directory and how it is used in the real world today Active Directory Basics ##Topics of Active Directory Fundamentals Task 1 Introduction Active Directory is the directory service for Windows Doma...ad
Kaustubh Rairaikaustubh.com·Dec 31, 2021Advent of Cyber 3 Notes 🎄Christmas rolled out and TryHackMe in the advent of Christmas made a room for cybersecurity enthusiasts. For the upcoming 25 days until christmas by learning the basics and completing a new, beginner friendly security exercise every day. The folklore...Postsadvent of cyber 3
Kaustubh Rairaikaustubh.com·Mar 9, 2021OWASP Top 🔟 2017Every cyber-security enthusiast has once come upon these terms OWASP Top 10. The Top 10 here means Top 10 Vulnerablities, the greatest software risks for any Web Application. OWASP is just an online community/non profit foundation that helps to impro...Postsdata exposure