// notesbynisha

Blog

Technical walkthroughs, cloud security guides, and notes from the field. 66 posts and counting.

Secure Secret Retrieval in AWS Lambda

A Practical Lab in Eliminating Hardcoded Credentials Using AWS Secrets Manager and IAM

AWS LambdaAWS Secrets ManagerIAMCloud Security
Read more →

AWS Lab Walkthrough: Troubleshooting IAM Access Issues

Learn how to troubleshoot IAM role assumption failures by aligning identity-based policies and trust relationships while maintaining least privilege.

AWSIAMTroubleshooting
Read more →

Exploiting AlwaysInstallElevated for Windows Privilege Escalation

A walkthrough of exploiting the AlwaysInstallElevated misconfiguration on Windows to escalate from user to SYSTEM using a malicious MSI payload.

Read more →

Devel Rooted: A Hack The Box Walkthrough

This post is a walkthrough of the 'Devel' retired machine from Hack The Box. I gain initial access through an exposed FTP and WebDAV setup, then escalate privileges using MS15-051.

hacktheboxwindowsinitial-accessftp
Read more →

Anonymous Rooted: A TryHackMe Walkthrough

This walkthrough covers the TryHackMe 'Anonymous' room. I gain user-level access via FTP and a writable script, capture the user flag, and escalate to root via a SUID misconfiguration.

TryHackMeinitial-accessftpreverse-shell
Read more →

Compromising the Dev Box: A PNPT Walkthrough with Mitigation and MITRE ATT&CK Mapping

A step-by-step walkthrough of compromising the Dev Box from TCM Security’s PNPT training course, including detailed explanations, mitigation steps, and a comprehensive mapping to MITRE ATT&CK tactics and techniques.

PNPTMITRE ATT&CKPrivilege EscalationWeb Exploits
Read more →

Investigate Web Attacks Challenge Walkthrough (Let's Defend)

A detailed walkthrough of how to solve the 'Investigating Web Attacks Challenge' on Let's Defend using the bWAPP web application as the victim.

Web Application SecurityIncident ResponseCybersecurityLet's Defend
Read more →

Exploring Splunk Data Administration: Parsing, Event Line Breaking, and Data Privacy

Exploring Splunk Data Administration: Parsing, Event Line Breaking, and Data Privacy

Read more →

Escalate and Defend: Linux Kernel Exploit Walkthrough

Escalate and Defend: Linux Kernel Exploit Walkthrough

Blog
Read more →

Understanding SMB Relay Attacks and Mitigation Techniques

Understanding SMB Relay Attacks and Mitigation Techniques

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

IPv6 DNS Takeover with MITM6 in an Active Directory Environment

IPv6 DNS Takeover with MITM6 in an Active Directory Environment

CybersecurityOffensivemitm6Penetration Testing
Read more →

Understanding SMB Relay Attacks and Mitigation Techniques

Understanding SMB Relay Attacks and Mitigation Techniques

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

Understanding LLMNR Poisoning and Mitigation Techniques

Understanding LLMNR Poisoning and Mitigation Techniques

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

My Journey to eJPT Certification: Insights and Tips for Success

My Journey to eJPT Certification: Insights and Tips for Success

eJPTCertificationEthical HackingPenetration Testing
Read more →

Hacking Kenobi: From Anonymous Access to Root like a Rebel

Hacking Kenobi: From Anonymous Access to Root like a Rebel

Read more →

Rooting the Academy Box: A Practical Ethical Hacking Walkthrough

>

Penetration TestingEnumerationLinux Privilege EscalationWeb App Security
Read more →

Exploiting EternalBlue (MS17-010): A Walkthrough and Protection Measures

A detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated methods.

Penetration TestingEthical HackingCybersecurityVulnerability Exploitation
Read more →

TryHackMe Ignite Room Walkthrough: Exploiting Fuel CMS 1.4.1 RCE

Walkthrough of TryHackMe's Ignite room where we exploit a Remote Code Execution vulnerability in Fuel CMS 1.4.1 (CVE-2018-16763). Learn the steps of enumeration, exploitation, privilege escalation, and defense strategies.

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

Network Services - THM Walkthrough by Nisha

Learn about, then enumerate and exploit a variety of network services and misconfigurations.

Penetration TestingEthical HackingCybersecurityVulnerability Exploitation
Read more →

Linux Fundamentals I - TryHackMe Walkthrough By Nisha

Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal..

Linux
Read more →

Introduction to Defensive Security - THM Walkthrough by Nisha

Introduction to Defensive Security - THM Walkthrough by Nisha

CybersecurityDefensiveBlue TeamTryHackMe
Read more →

Introduction to AWS Identity and Access Management (IAM)

A beginner-friendly walkthrough of managing users, groups, and permissions in AWS Identity and Access Management (IAM).

Read more →

Creating VNet-to-VNet Connections in Microsoft Azure

This walkthrough details how to create secure VPN Gateway connections between two Azure Virtual Networks using VNet-to-VNet tunneling. Learn how to configure VPN Gateways, establish encrypted connections, and verify the status—all from the Azure portal.

AzureVNetVPN GatewayNetworking
Read more →

How to Create Point-to-Site VPN Connections in Microsoft Azure

How to Create Point-to-Site VPN Connections in Microsoft Azure

CloudAzureNetworkingVPN
Read more →

How to Create Site-to-Site VPN Connections in Microsoft Azure

How to Create Site-to-Site VPN Connections in Microsoft Azure

CloudAzureNetworkingVPN
Read more →

Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)

Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)

CloudAzureNetworking
Read more →

Configure Azure Load Balancer

Configure Azure Load Balancer

CloudAzureNetworking
Read more →

Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)

Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)

CloudAzureNetworking
Read more →

Deploy Azure Application Gateway to Direct Web Traffic

Deploy Azure Application Gateway to Direct Web Traffic

CloudAzureNetworking
Read more →

Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites

Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites

CloudAzureNetworkingFirewall
Read more →

2023-01-13-Enable-Session-Stickiness-Using-An-Application-Load-Balancer-in-AWS-(ALB)

2023-01-13-Enable-Session-Stickiness-Using-An-Application-Load-Balancer-in-AWS-(ALB)

Read more →

2023-01-16-Deploy-Amazon-Connect-Contact-Center

2023-01-16-Deploy-Amazon-Connect-Contact-Center

Read more →

2023-01-19-How-to-Deploy-a-Secured-Static-Website-on-AWS

2023-01-19-How-to-Deploy-a-Secured-Static-Website-on-AWS

Read more →

2023-03-29-AWS-Networking-Multi-VPC-Architecture

2023-03-29-AWS-Networking-Multi-VPC-Architecture

Read more →

2023-04-03-Enable Inter-VPC-Connectivity-Using-Peering-Connections-In-AWS

2023-04-03-Enable Inter-VPC-Connectivity-Using-Peering-Connections-In-AWS

Read more →

2023-04-16-Enable Inter-VPC-Connectivity-With-AWS-Transit-Gateway

2023-04-16-Enable Inter-VPC-Connectivity-With-AWS-Transit-Gateway

Read more →

2023-04-17-Configure-Network-Monitoring-in-AWS

2023-04-17-Configure-Network-Monitoring-in-AWS

Read more →

2023-04-17-Implement-Security-Controls-in-AWS

2023-04-17-Implement-Security-Controls-in-AWS

Read more →

Windows Fundamentals 1 - TryHackMe Walkthrough

Windows Fundamentals 1 - TryHackMe Walkthrough

CybersecurityKaliRDPTools
Read more →

2023-07-13-Vulnerability-Scanning-with-OpenVAS-Unveiling-Cybersecurity-Insights

2023-07-13-Vulnerability-Scanning-with-OpenVAS-Unveiling-Cybersecurity-Insights

Read more →

Splunk Basics / Splunk 101 (TryHackMe Walkthrough)

Splunk Basics / Splunk 101 (TryHackMe Walkthrough)

CybersecuritySIEMSplunkLog Management
Read more →

Incident Handling With Splunk / Splunk 201 (TryHackMe Walkthrough)

Incident Handling With Splunk / Splunk 201 (TryHackMe Walkthrough)

CybersecuritySIEMSplunkLog Management
Read more →

2023-08-01-Create-Virtual-Networks-in-Azure

2023-08-01-Create-Virtual-Networks-in-Azure

Read more →

2023-08-01-Identity-and-Access-Management-Azure-Policy

2023-08-01-Identity-and-Access-Management-Azure-Policy

Read more →

2023-08-01-Identity-and-Access-Management-Resource-Manager-Locks in Azure

2023-08-01-Identity-and-Access-Management-Resource-Manager-Locks in Azure

Read more →

2023-08-01-Identity-and-Access-Management-Role-Based-Access-Control

2023-08-01-Identity-and-Access-Management-Role-Based-Access-Control

Read more →

How to Configure DNS Settings in Microsoft Azure

How to Configure DNS Settings in Microsoft Azure

Azure
Read more →

2023-08-06-Vulnerability-Scanning-with-Nmap-Network-Scanning

2023-08-06-Vulnerability-Scanning-with-Nmap-Network-Scanning

Read more →

How to Create Configure a DMZ on Palo Alto FIrewall

How to Create Configure a DMZ on Palo Alto FIrewall

Network SecurityCybersecurityNetworkingFirewall
Read more →

2023-09-17-Vulnerability-Scanning-Nessus

2023-09-17-Vulnerability-Scanning-Nessus

Read more →

Introduction to Offensive Security - THM Walkthrough by Nisha

Introduction to Offensive Security - THM Walkthrough by Nisha

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

The Art of Reconnaissance in Cybersecurity

The Art of Reconnaissance in Cybersecurity

Cybersecurity
Read more →

Walking An Application - THM Walkthrough by Nisha

Walking An Application - THM Walkthrough by Nisha

CybersecurityOffensiveRed TeamWeb App
Read more →

Meow - HTB Walkthrough by Nisha

Meow - HTB Walkthrough by Nisha

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

Content Discovery - THM Walkthrough by Nisha

Content Discovery - THM Walkthrough by Nisha

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

Wireshark: The Basics - THM Walkthrough by Nisha

Wireshark: The Basics - THM Walkthrough by Nisha

CybersecurityDefensiveBlue TeamWireshark
Read more →

2023-12-23-rootme-thm

2023-12-23-rootme-thm

Read more →

Windows Event Logs (TryHackMe Walkthrough)

Windows Event Logs (TryHackMe Walkthrough)

CybersecurityWindowsLoggingMonitoring
Read more →

TryHackMe Walkthough - Post-Exploitation Basics

TryHackMe Walkthough - Post-Exploitation Basics

Cybersecurity
Read more →

How to Install Remmina on Kali Linux

How to Install Remmina on Kali Linux

Cybersecurity
Read more →

TryHackMe Ice - Walkthrough by Nisha

TryHackMe Ice - Walkthrough by Nisha

CybersecurityWindowsPenetration TestingEthical Hacking
Read more →

Steel Mountain - TryHackMe Walkthrough by Nisha

Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.

TryHackMeCTFPrivilege EscalationWeb Exploits
Read more →

TryHackMe IDOR Room Walkthrough

TryHackMe IDOR Room Walkthrough

IDORWeb SecurityPentestingTryHackMe
Read more →

Dancing - HTB Walkthrough by Nisha

Dancing - HTB Walkthrough by Nisha

CybersecurityOffensiveRed TeamPenetration Testing
Read more →

TryHackMe: Enumeration & Brute Force Room Walkthrough

TryHackMe: Enumeration & Brute Force Room Walkthrough

Penetration TestingEnumerationBrute ForceOSINT
Read more →

LazyAdmin TryHackMe Walkthrough

A complete walkthrough of the LazyAdmin room on TryHackMe, demonstrating enumeration, exploitation, and privilege escalation.

TryHackMeCTFPrivilege EscalationWeb Exploits
Read more →