Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets We covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to…
Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough In this post, we covered the solution of Cyberseclabs potato where we demonstrated the exploitation of a vulnerable Jenkins server and the…
Android Reverse Engineering Basics | Part 1 | React Native Applications We covered the first part of Android applications reverse engineering basics where we discussed file format of Android applications, the…
Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to detect signs of…
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web application running on port 8000 where we…
Microsoft Cyber Security Analyst SC-900 Study Notes Microsoft Cyber Security Analyst SC-900 Exam Details
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks We covered Linux authentication logs, log files locations in Linux, Linux log analysis tools available in Linux and took a case study where…
Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part of the OSCP pathway. In this part…
Network Forensics with Powershell | TryHackMe Windows Network Analysis We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine making network connections…