Feb 7 · 5 min read · Modern networks power almost everything we use today, from websites and cloud services to enterprise systems and personal devices. Yet, most users never see what happens behind the scenes.In cybersecurity and network administration, understanding wha...
Join discussion
Jan 30 · 4 min read · DISCLAIMER THIS HAS BEEN ISSUED AND WRITTEN ONLY FOR EDUCATIONAL PURPOSES ONLY, TO SEE HOW HACKERS USE SOCIAL ENGINEERING FOR RECONNAISSANCE AND HARVEST INFORMATION ABOUT THEIR TARGETS WE HAVE TO USE THIS TO BE INFORMED AND REALIZE HOW TO PREVENT THI...
Join discussion
Jan 29 · 6 min read · Reconnaissance has always been the foundation of offensive security. Before exploitation, before payloads, before privilege escalation, there is recon. What has changed is not the importance of recon, but its nature. The image above represents a new ...
Join discussion
Jan 24 · 10 min read · Overview "The Evil Within" is a TryHackMe CTF challenge inspired by the psychological horror video game of the same name. Created by ShalindaFdo as their first room, this challenge tasks us with helping Sebastian and his team of investigators survive...
Join discussion
Jan 15 · 9 min read · Introduction Tokyo Ghoul CTF Challenge - A Complete Walkthrough This write-up documents my journey through the "Tokyo Ghoul" room on TryHackMe, a beginner-to-intermediate level capture-the-flag challenge inspired by the popular anime series. This roo...
Join discussion
Jan 1 · 2 min read · Happy New Year! As I was closing out part one of my reconnaissance blog I mentioned that you should find a way to structure your reports so non-technical users are able to understand what the heck we are talking about. Below I will share a rough temp...
Join discussion