Search Post related with “Interesting Stuff”
*Total Post : 332 posts
Last 25 POST
- My book on Cyber Threat Intel, that never quite made it as a book, Chapter 1.1This content explores the significance of Cyber Threat Intelligence (CTI) in improving organizational security and understanding the threat landscape. It delves into the motivations of various types of threat actors, their tactics, and how to effectively mitigate risks. The goal is to provide a comprehensive guide that enhances awareness and
- Understanding Russian Cognitive WarfareThis article explores Russia’s cognitive warfare tactics, rooted in Soviet KGB doctrines, and their modern adaptations involving disinformation and cyber operations. It presents strategies to counter these tactics, including targeted cyber retaliation and strategic communication, utilizing frameworks such as SWOT and DIMEFIL. A comprehensive analysis is provided on the strategic
- Counter-Strategy Against State-Sponsored Proxies & ChinaThis article discusses strategies to counter China’s use of state-sponsored proxies in hybrid warfare. It analyzes the threats posed by these proxies, such as cyber groups and political influence networks, and outlines a comprehensive approach utilizing frameworks like DIMEFIL and SWOT. A coordinated response involving diplomatic, military, economic, and cyber
- John the Ripper: The Basics – Tryhackme (Premium Room)John the Ripper is a powerful hash-cracking tool that efficiently cracks various hash types such as Windows authentication hashes, /etc/shadow hashes, and password-protected files. Through practical tasks, users learn the syntax, features, and methods to conduct dictionary attacks and utilize custom rules. Affected: Windows systems, Linux systems, password-protected ZIP and
- Jack of All Trades: Securi-Tay 2020 – Write-UpIn this web content, we explore the Securi-Tay 2020 TryHackMe boot-to-root challenge, highlighting the various unconventional techniques used to gain access to a target system. The article details an adventure filled with port misconfigurations, steganography, and privilege escalation, providing valuable insights and lessons learned from this Capture the Flag (CTF)
- PicoCTF 2025 WalkthroughThe article provides walkthroughs for various challenges in the PicoCTF 2025 competition, focusing on different aspects of cybersecurity such as cryptography, reverse engineering, and web exploitation. It details methods for cracking hashes, decoding encrypted messages, analyzing binaries, and exploiting web vulnerabilities to capture flags. Affected: cybersecurity sector, educational platforms Keypoints
- CompTIA Security+ Review and TipsThis article provides a personal review of the CompTIA Security+ (SY0–701) exam preparation journey, highlighting effective strategies and resources used for studying. It emphasizes the importance of understanding core concepts and practical application over rote memorization. Additionally, it shares tips for exam day to enhance the testing experience. Affected: CompTIA
- Daily News Update: Friday, March 28, 2025 (Australia/Melbourne)A wave of cybersecurity incidents has revealed vulnerabilities across various platforms, affecting developers, healthcare providers, enterprises, and individuals. Notably, npm packages were compromised to steal sensitive information, a critical flaw was patched in Firefox, a ransomware fine was issued to a UK company, and numerous vulnerabilities were identified in solar
- Red Team Perspective: Known Attack Surface and Potential Risks of GitLab – Security KER – Security Information PlatformThis article discusses various known attack surfaces and potential risks associated with GitLab, highlighting a range of vulnerabilities, including Remote Code Execution (RCE), SSRF, XSS, and permission escalation issues. The information covers the history of vulnerabilities, their impact, and famous cases, emphasizing the importance of security measures for self-managed GitLab
- HTB Cyber Apocalypse 2025 – Quack QuackIn a chaotic quest to reclaim the Dragon’s Heart, Sir Alaric must confront Lord Malakar, who has cursed villagers into ducks. The solution involves exploiting a coding vulnerability to bypass security measures and execute a ‘duck_attack’ function, showcasing techniques such as buffer overflow and canary leaking. Affected: villagers, software security,
- Pentesting Tools Exploiting SMB With PsExecThis article provides an educational overview of PsExec, a Windows utility for executing commands on remote systems using valid user credentials. It discusses the process of performing penetration testing using PsExec, including scanning for SMB services, brute-forcing user credentials, and utilizing PsExec.py for executing commands remotely. Lastly, it highlights the
- Detecting Obfuscated PowerShell Attacks Using Sysmon and the ELK StackThis article describes a lab project focused on detecting obfuscated PowerShell attacks using Sysmon, Winlogbeat, and the ELK stack. It highlights the challenges presented by attackers utilizing PowerShell and command-line obfuscation, aiming to provide defenders with hands-on experience in threat detection. The lab teaches students to recognize malicious activities, log
- Intercept VulnLab RBCD & Another word For ESC7This article provides a detailed write-up on a recent Active Directory exploitation exercise. The author, known as Maverick, shares their experiences and methods used for exploiting vulnerabilities such as NTLM relay attacks, credential dumping, and privilege escalation within a Windows environment. The write-up includes steps taken to gain access, perform
- Next.js CVE-2025-29927: Tryhackme WriteupA critical vulnerability identified as CVE-2025-29927 has been discovered in Next.js, a widely-used web framework. This flaw enables attackers to bypass middleware-based authorization, posing significant security risks for applications built on Next.js, including e-commerce sites and SaaS platforms. Developers are urged to upgrade to the latest versions to prevent unauthorized
- Pentesting for Biotech: Simulating a Cyberattack on Your Genomic DataBiotech firms, holding sensitive data such as patient genomes and drug formulas, are prime targets for cyberattacks due to their high value. Cybercriminals can exploit such data for financial gain, leading to risks that include compromised patient safety and legal penalties. Biotech penetration testing is crucial to safeguard against these
- Unveiled the Threat ActorsThis article explores various threat actors known for their significant cyber attacks, detailing their origins, techniques, and famous hacks. It categorizes these actors by their affiliations, such as state-sponsored and financially motivated groups, providing insight into their behaviors and methodologies. Affected: Government networks, financial institutions, healthcare, energy sector, retail, hospitality,
- TCS HackQuest Season 9The TCS HackQuest competition serves as a recruitment event for Tata Consultancy Services, targeting final-year undergraduate and postgraduate students. The selection process includes three categories and consists of two CTF rounds followed by an interview. Despite a challenging platform and experience, the author advanced through the rounds and shared insights
- SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAPSQL Injection remains a significant vulnerability in web applications, allowing attackers to compromise databases. This guide introduces SQLMAP, a robust tool that automates the detection and exploitation of SQL Injection vulnerabilities through practical examples. Key topics include types of SQL Injection, commands for using SQLMAP effectively, and methods for bypassing
- Microsoft 365 Copilot For Work: Image Data Exfiltration From SharePointA recent vulnerability was discovered in Microsoft Copilot for Work, allowing potential data exfiltration of images from SharePoint via HTML injection. By tricking Copilot into rendering image tags, authenticated users could access sensitive images without direct file access. Microsoft Security Response Center (MSRC) has since acknowledged the issue but categorized
- Cryptojacking: When Hackers Hijack Your Cloud to Mine MoneyCryptojacking attacks have surged, with attackers increasingly exploiting lesser-known AWS services to mine cryptocurrency at the expense of unsuspecting users. This article discusses the rise of cryptojacking, highlights the AmberSquid campaign, and outlines preventive measures to secure AWS accounts from such attacks. Affected: AWS users, cloud infrastructure, cryptojacking victims Keypoints
- Red Team Tools (Github)
RECONNAISSANCE:
INITIAL ACCESS:
DELIVERY:
COMMAND AND CONTROL:
CREDENTIAL DUMPING:
PRIVILEGE ESCALATION:
DEFENSE EVASION:
PERSISTENCE:
LATERAL MOVEMENT:
EXFILTRATION: Credit: https://www.linkedin.com/posts/ouardi-mohamed-hamdi_share-someone-needs-it-𝐑𝐞𝐝-𝐓𝐞𝐚𝐦-activity-7308435135865970688-hZTW/ Tags: DEFENSE EVASION, CREDENTIAL, PRIVILEGE, RECONNAISSANCE, EXFILTRATION, INITIAL ACCESS, PERSISTENCE, LATERAL MOVEMENT
- The Art of Wi-Fi Hacking & Protection with Aircrack-ngThis article provides a comprehensive guide on hacking and securing Wi-Fi networks using Aircrack-ng, detailing practical attack techniques and encryption vulnerabilities, as well as prevention strategies. The focus is on educating users about Wi-Fi security to help them protect their networks from potential attacks. Affected: Wi-Fi networks, cybersecurity sector Keypoints
- Adversarial AI Digest — 20 March, 2025This article presents a comprehensive overview of the latest research and insights into AI security, including vulnerabilities in AI technologies, evaluation criteria for AI security products, and autonomous ethical hacking methods. Various reports and upcoming events focused on AI security challenges are also highlighted. Affected: AI security products, UK AI
- 0+ Bug Bounty Payouts: Exploiting Content Providers with SQL InjectionThis blog explains how to detect SQL injection vulnerabilities in an Android app’s content provider using Drozer. Content providers manage app data and control access to it, allowing secure interactions with data. The article provides a step-by-step guide for exploiting these vulnerabilities to gain unauthorized access to data. Affected: Android
- Hacking Open Docker Registries: Pulling, Extracting, and Exploiting ImagesThis article discusses the security risks associated with misconfigured Docker registries, featuring a firsthand account of exploiting such a vulnerability to gain unauthorized access to sensitive data. The author provides a detailed walkthrough on discovering open Docker registries, extracting information from images, and even injecting a backdoored image if the