Feb 15 · 4 min read · Today, we’re investigating another LetsDefend alert: SOC176 – RDP Brute Force Detected (EventID: 234). This alert focuses on suspicious Remote Desktop Protocol (RDP) activity that may indicate a brute force attack. 🔎 Alert Overview The alert det...
Join discussion
Aug 26, 2025 · 2 min read · Lab Environment: Attacker Machine: Kali Linux (VMware Workstation) Target Machine: Metasploitable 2 (VMware Workstation) Network Configuration: Host-only / NAT (isolated lab environment) 1. Objective The objective of this lab was to perform a p...
Join discussion
Jul 21, 2025 · 3 min read · Scenario - Part 1 The first part of the skills assessment will require you to brute-force the the target instance. Successfully finding the correct login will provide you with the username you will need to start Skills Assessment Part 2. You might fi...
Join discussion
May 19, 2025 · 4 min read · Author Name: Roland Victor MusaSystem Used: Kali Linux , Target OS: Ubuntu Server Target Service: • Choose a service to attack (e.g.FTP, SSH, HTTP). • Create a user with a weak password for demonstration purposes. Project Overview This lab demonstra...
Join discussion
Apr 4, 2025 · 12 min read · Introduction Keys and passwords, the modern equivalent of locks and combinations, secure the digital world. But what if someone tries every possible combination until they find the one that opens the door? That, in essence, is brute forcing. What is ...
Join discussionMar 21, 2025 · 4 min read · This lab's two-factor authentication is vulnerable due to its flawed logic. To solve the lab, access Carlos's account page. Your credentials: wiener:peter Victim's username: carlos Analysis: Step 1: Observing the Authentication Process The first...
Join discussionDec 3, 2024 · 5 min read · Le brute-force de sous-domaines est une méthode utilisée pour découvrir des sous-domaines associés à un domaine principal. Elle consiste à essayer une liste de mots pour évaluer des sous-domaines potentiels afin de vérifier leur réel existence. Ces s...
Join discussion
Oct 9, 2024 · 5 min read · In the realm of cybersecurity, Brute Force Attacks stand as one of the most fundamental and common threats. Despite their simplicity, they can be incredibly dangerous if left unchecked. This blog explores what a brute force attack is, presents a real...
Join discussion
Sep 9, 2024 · 4 min read · Pré-requis Installation de Wazuh Déploiements des agents Wazuh Intégration Virus Total (facultatif) Après avoir installé l'agent Wazuh sur les terminaux, la prochaine étape est de configurer des règles de détection. Il en existe plusieurs expliq...
00x7b4 commented