May 6 · 5 min read · In the realm of cybersecurity, the velocity and sophistication of threats continue to escalate, putting unprecedented pressure on security teams. According to the 2024 SANS Incident Response Survey, o
Join discussion
Feb 25 · 2 min read · Introduction Cisco Talos has recently identified active exploitation of CVE-2026-20127, a critical vulnerability in Cisco Catalyst SD-WAN Controller. This post dives into the technical details, detection queries, and patch steps necessary to protect ...
Join discussionOct 26, 2025 · 3 min read · Last week while working on the TryHackMe SOC Level 1 course a big focus of the content was Network Forensics. This is a pivotal part of cybersecurity as understanding how to engage in network forensics is crucial for the safety of any company. The pr...
Join discussionSep 19, 2025 · 4 min read · Introduction In this walkthrough, we simulate a reverse TCP shell attack using Metasploit Framework to demonstrate how such techniques work in real-time scenarios. This demonstration focus especially for the endpoint security rather than the penetrat...
Join discussion
Aug 20, 2025 · 8 min read · I initially wanted to do a single article on TryHackMe’s first Snort room but halfway through it, I realized how long it was – so I decided to split it into two (or three) parts. Here’s the first one! Introduction In my previous article, when disc...
Join discussionJul 10, 2025 · 2 min read · Introduction Building your own virtualised network forces you to learn the hard stuff—routing, high availability kubernetes cluster, monitoring—without waiting for budget sign-off. I spent 358 hours on a diploma project to prove it. Here’s the what-a...
Join discussion
Dec 10, 2024 · 7 min read · Heads up: Some of the vulnerabilities found in the reports were created for the explicit purpose of testing the accuracy and reliability of OpenVAS as a tool and platform. TL;DR:This blog post explores the implementation of OpenVAS (Open Vulnerabilit...
Join discussion
Sep 6, 2024 · 6 min read · Introduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...
Join discussion