Jan 3 · 9 min read · Author:CyberDudeBivashPowered by:CyberDudeBivash Brand |cyberdudebivash.comRelated:cyberbivash.blogspot.com Daily Threat Intel by CyberDudeBivashZero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.Follow on LinkedInApps & Sec...
Join discussion
Jan 1 · 3 min read · For Day 17 of my Advent of Cyber 2025 marathon, the mission intensified with "CyberChef — Hoperation Save McSkidy," where I launched a rescue attempt to breach the Quantum Fortress,. McSkidy was imprisoned by Sir Breacher Block III, and the only way ...
Join discussion
Nov 18, 2025 · 14 min read · Cyber threat intelligence (CTI) is paramount to effective blue team operations, as it provides the contextual awareness needed to understand, prioritize, and respond to threats. By enriching security findings with indicators of compromise (IOCs) such...
Join discussionOct 11, 2025 · 6 min read · الـسـلام عـلـيكـم ورحـمـة الله وبـركاته 🕵️♀️ Today, we’ll talk about Network Forensics Network Forensics is a branch of digital forensics that focuses on analyzing network traffic to investigate and reconstruct cyber incidents.In simple words, it h...
Join discussion
Sep 30, 2025 · 10 min read · The purpose of this blog is to constantly document work I’m doing in my spare time to build up practical skills, typically using CyberDefenders, BTLO and TryHackMe for labs / challenges to really build on my technical skills. The challenges in this b...
Join discussionSep 23, 2025 · 2 min read · Questions: Which Linux distribution is being used on this machine? To find this, first extract the zip file and open the .ad1 file on FTKImager. Then, search through the boot files to find the distribution being used. Answer: Kali What is the MD5...
Join discussion
Sep 23, 2025 · 4 min read · Questions: After flooding the IIS host with rapid-fire probes, the attacker reveals their origin. Which IP address generated this reconnaissance traffic? IIS is a flexible and extensible web server software developed by Microsoft for Windows operat...
Join discussion
Sep 22, 2025 · 3 min read · Questions: What is the MD5 hash of the potentially malicious EXE file the user downloaded? Since the questions asks us the hash of the file downloaded, we can navigate to the Downloads folder to find the suspicious file. The file has a double exte...
Join discussion