Feb 25 · 2 min read · Introduction Cisco Talos has recently identified active exploitation of CVE-2026-20127, a critical vulnerability in Cisco Catalyst SD-WAN Controller. This post dives into the technical details, detection queries, and patch steps necessary to protect ...
Join discussionOct 26, 2025 · 3 min read · Last week while working on the TryHackMe SOC Level 1 course a big focus of the content was Network Forensics. This is a pivotal part of cybersecurity as understanding how to engage in network forensics is crucial for the safety of any company. The pr...
Join discussionSep 19, 2025 · 4 min read · Introduction In this walkthrough, we simulate a reverse TCP shell attack using Metasploit Framework to demonstrate how such techniques work in real-time scenarios. This demonstration focus especially for the endpoint security rather than the penetrat...
Join discussion
Aug 20, 2025 · 8 min read · I initially wanted to do a single article on TryHackMe’s first Snort room but halfway through it, I realized how long it was – so I decided to split it into two (or three) parts. Here’s the first one! Introduction In my previous article, when disc...
Join discussionJul 10, 2025 · 2 min read · Introduction Building your own virtualised network forces you to learn the hard stuff—routing, high availability kubernetes cluster, monitoring—without waiting for budget sign-off. I spent 358 hours on a diploma project to prove it. Here’s the what-a...
Join discussion
Dec 10, 2024 · 7 min read · Heads up: Some of the vulnerabilities found in the reports were created for the explicit purpose of testing the accuracy and reliability of OpenVAS as a tool and platform. TL;DR:This blog post explores the implementation of OpenVAS (Open Vulnerabilit...
Join discussion
Sep 6, 2024 · 6 min read · Introduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...
Join discussion
Aug 23, 2024 · 2 min read · In today's interconnected world, cybersecurity is more than just a technical term it's a critical necessity. As our reliance on digital platform grows, so do the threats posed by cybercriminals. Whether it's protecting sensitive data, maintaining pri...
Join discussion
May 1, 2024 · 18 min read · Introduction to Network Policies In this blog episode, we're diving into the world of Kubernetes Network Policies. But before we get there, let's talk about the main headache these policies aim to fix. So, without Network Policies, Kubernetes lets Po...
Join discussion