Secure Secret Retrieval in AWS Lambda
A Practical Lab in Eliminating Hardcoded Credentials Using AWS Secrets Manager and IAM
AWS LambdaAWS Secrets ManagerIAMCloud Security
Read more →
AWS Lab Walkthrough: Troubleshooting IAM Access Issues
Learn how to troubleshoot IAM role assumption failures by aligning identity-based policies and trust relationships while maintaining least privilege.
AWSIAMTroubleshooting
Read more →
Exploiting AlwaysInstallElevated for Windows Privilege Escalation
A walkthrough of exploiting the AlwaysInstallElevated misconfiguration on Windows to escalate from user to SYSTEM using a malicious MSI payload.
Read more →
Devel Rooted: A Hack The Box Walkthrough
This post is a walkthrough of the 'Devel' retired machine from Hack The Box. I gain initial access through an exposed FTP and WebDAV setup, then escalate privileges using MS15-051.
hacktheboxwindowsinitial-accessftp
Read more →
Anonymous Rooted: A TryHackMe Walkthrough
This walkthrough covers the TryHackMe 'Anonymous' room. I gain user-level access via FTP and a writable script, capture the user flag, and escalate to root via a SUID misconfiguration.
TryHackMeinitial-accessftpreverse-shell
Read more →
Compromising the Dev Box: A PNPT Walkthrough with Mitigation and MITRE ATT&CK Mapping
A step-by-step walkthrough of compromising the Dev Box from TCM Security’s PNPT training course, including detailed explanations, mitigation steps, and a comprehensive mapping to MITRE ATT&CK tactics and techniques.
PNPTMITRE ATT&CKPrivilege EscalationWeb Exploits
Read more →
Investigate Web Attacks Challenge Walkthrough (Let's Defend)
A detailed walkthrough of how to solve the 'Investigating Web Attacks Challenge' on Let's Defend using the bWAPP web application as the victim.
Web Application SecurityIncident ResponseCybersecurityLet's Defend
Read more →
Exploring Splunk Data Administration: Parsing, Event Line Breaking, and Data Privacy
Exploring Splunk Data Administration: Parsing, Event Line Breaking, and Data Privacy
Read more →
Escalate and Defend: Linux Kernel Exploit Walkthrough
Escalate and Defend: Linux Kernel Exploit Walkthrough
Blog
Read more →
Understanding SMB Relay Attacks and Mitigation Techniques
Understanding SMB Relay Attacks and Mitigation Techniques
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
IPv6 DNS Takeover with MITM6 in an Active Directory Environment
IPv6 DNS Takeover with MITM6 in an Active Directory Environment
CybersecurityOffensivemitm6Penetration Testing
Read more →
Understanding SMB Relay Attacks and Mitigation Techniques
Understanding SMB Relay Attacks and Mitigation Techniques
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
Understanding LLMNR Poisoning and Mitigation Techniques
Understanding LLMNR Poisoning and Mitigation Techniques
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
My Journey to eJPT Certification: Insights and Tips for Success
My Journey to eJPT Certification: Insights and Tips for Success
eJPTCertificationEthical HackingPenetration Testing
Read more →
Hacking Kenobi: From Anonymous Access to Root like a Rebel
Hacking Kenobi: From Anonymous Access to Root like a Rebel
Read more →
Rooting the Academy Box: A Practical Ethical Hacking Walkthrough
>
Penetration TestingEnumerationLinux Privilege EscalationWeb App Security
Read more →
Exploiting EternalBlue (MS17-010): A Walkthrough and Protection Measures
A detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated methods.
Penetration TestingEthical HackingCybersecurityVulnerability Exploitation
Read more →
TryHackMe Ignite Room Walkthrough: Exploiting Fuel CMS 1.4.1 RCE
Walkthrough of TryHackMe's Ignite room where we exploit a Remote Code Execution vulnerability in Fuel CMS 1.4.1 (CVE-2018-16763). Learn the steps of enumeration, exploitation, privilege escalation, and defense strategies.
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
Network Services - THM Walkthrough by Nisha
Learn about, then enumerate and exploit a variety of network services and misconfigurations.
Penetration TestingEthical HackingCybersecurityVulnerability Exploitation
Read more →
Linux Fundamentals I - TryHackMe Walkthrough By Nisha
Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal..
Linux
Read more →
Introduction to Defensive Security - THM Walkthrough by Nisha
Introduction to Defensive Security - THM Walkthrough by Nisha
CybersecurityDefensiveBlue TeamTryHackMe
Read more →
Introduction to AWS Identity and Access Management (IAM)
A beginner-friendly walkthrough of managing users, groups, and permissions in AWS Identity and Access Management (IAM).
Read more →
Creating VNet-to-VNet Connections in Microsoft Azure
This walkthrough details how to create secure VPN Gateway connections between two Azure Virtual Networks using VNet-to-VNet tunneling. Learn how to configure VPN Gateways, establish encrypted connections, and verify the status—all from the Azure portal.
AzureVNetVPN GatewayNetworking
Read more →
How to Create Point-to-Site VPN Connections in Microsoft Azure
How to Create Point-to-Site VPN Connections in Microsoft Azure
CloudAzureNetworkingVPN
Read more →
How to Create Site-to-Site VPN Connections in Microsoft Azure
How to Create Site-to-Site VPN Connections in Microsoft Azure
CloudAzureNetworkingVPN
Read more →
Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)
Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)
CloudAzureNetworking
Read more →
Configure Azure Load Balancer
Configure Azure Load Balancer
CloudAzureNetworking
Read more →
Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)
Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)
CloudAzureNetworking
Read more →
Deploy Azure Application Gateway to Direct Web Traffic
Deploy Azure Application Gateway to Direct Web Traffic
CloudAzureNetworking
Read more →
Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites
Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites
CloudAzureNetworkingFirewall
Read more →
2023-01-13-Enable-Session-Stickiness-Using-An-Application-Load-Balancer-in-AWS-(ALB)
2023-01-13-Enable-Session-Stickiness-Using-An-Application-Load-Balancer-in-AWS-(ALB)
Read more →
2023-01-16-Deploy-Amazon-Connect-Contact-Center
2023-01-16-Deploy-Amazon-Connect-Contact-Center
Read more →
2023-01-19-How-to-Deploy-a-Secured-Static-Website-on-AWS
2023-01-19-How-to-Deploy-a-Secured-Static-Website-on-AWS
Read more →
2023-03-29-AWS-Networking-Multi-VPC-Architecture
2023-03-29-AWS-Networking-Multi-VPC-Architecture
Read more →
2023-04-03-Enable Inter-VPC-Connectivity-Using-Peering-Connections-In-AWS
2023-04-03-Enable Inter-VPC-Connectivity-Using-Peering-Connections-In-AWS
Read more →
2023-04-16-Enable Inter-VPC-Connectivity-With-AWS-Transit-Gateway
2023-04-16-Enable Inter-VPC-Connectivity-With-AWS-Transit-Gateway
Read more →
2023-04-17-Configure-Network-Monitoring-in-AWS
2023-04-17-Configure-Network-Monitoring-in-AWS
Read more →
2023-04-17-Implement-Security-Controls-in-AWS
2023-04-17-Implement-Security-Controls-in-AWS
Read more →
Windows Fundamentals 1 - TryHackMe Walkthrough
Windows Fundamentals 1 - TryHackMe Walkthrough
CybersecurityKaliRDPTools
Read more →
2023-07-13-Vulnerability-Scanning-with-OpenVAS-Unveiling-Cybersecurity-Insights
2023-07-13-Vulnerability-Scanning-with-OpenVAS-Unveiling-Cybersecurity-Insights
Read more →
Splunk Basics / Splunk 101 (TryHackMe Walkthrough)
Splunk Basics / Splunk 101 (TryHackMe Walkthrough)
CybersecuritySIEMSplunkLog Management
Read more →
Incident Handling With Splunk / Splunk 201 (TryHackMe Walkthrough)
Incident Handling With Splunk / Splunk 201 (TryHackMe Walkthrough)
CybersecuritySIEMSplunkLog Management
Read more →
2023-08-01-Create-Virtual-Networks-in-Azure
2023-08-01-Create-Virtual-Networks-in-Azure
Read more →
2023-08-01-Identity-and-Access-Management-Azure-Policy
2023-08-01-Identity-and-Access-Management-Azure-Policy
Read more →
2023-08-01-Identity-and-Access-Management-Resource-Manager-Locks in Azure
2023-08-01-Identity-and-Access-Management-Resource-Manager-Locks in Azure
Read more →
2023-08-01-Identity-and-Access-Management-Role-Based-Access-Control
2023-08-01-Identity-and-Access-Management-Role-Based-Access-Control
Read more →
How to Configure DNS Settings in Microsoft Azure
How to Configure DNS Settings in Microsoft Azure
Azure
Read more →
2023-08-06-Vulnerability-Scanning-with-Nmap-Network-Scanning
2023-08-06-Vulnerability-Scanning-with-Nmap-Network-Scanning
Read more →
How to Create Configure a DMZ on Palo Alto FIrewall
How to Create Configure a DMZ on Palo Alto FIrewall
Network SecurityCybersecurityNetworkingFirewall
Read more →
2023-09-17-Vulnerability-Scanning-Nessus
2023-09-17-Vulnerability-Scanning-Nessus
Read more →
Introduction to Offensive Security - THM Walkthrough by Nisha
Introduction to Offensive Security - THM Walkthrough by Nisha
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
The Art of Reconnaissance in Cybersecurity
The Art of Reconnaissance in Cybersecurity
Cybersecurity
Read more →
Walking An Application - THM Walkthrough by Nisha
Walking An Application - THM Walkthrough by Nisha
CybersecurityOffensiveRed TeamWeb App
Read more →
Meow - HTB Walkthrough by Nisha
Meow - HTB Walkthrough by Nisha
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
Content Discovery - THM Walkthrough by Nisha
Content Discovery - THM Walkthrough by Nisha
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
Wireshark: The Basics - THM Walkthrough by Nisha
Wireshark: The Basics - THM Walkthrough by Nisha
CybersecurityDefensiveBlue TeamWireshark
Read more →
Windows Event Logs (TryHackMe Walkthrough)
Windows Event Logs (TryHackMe Walkthrough)
CybersecurityWindowsLoggingMonitoring
Read more →
TryHackMe Walkthough - Post-Exploitation Basics
TryHackMe Walkthough - Post-Exploitation Basics
Cybersecurity
Read more →
How to Install Remmina on Kali Linux
How to Install Remmina on Kali Linux
Cybersecurity
Read more →
TryHackMe Ice - Walkthrough by Nisha
TryHackMe Ice - Walkthrough by Nisha
CybersecurityWindowsPenetration TestingEthical Hacking
Read more →
Steel Mountain - TryHackMe Walkthrough by Nisha
Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.
TryHackMeCTFPrivilege EscalationWeb Exploits
Read more →
TryHackMe IDOR Room Walkthrough
TryHackMe IDOR Room Walkthrough
IDORWeb SecurityPentestingTryHackMe
Read more →
Dancing - HTB Walkthrough by Nisha
Dancing - HTB Walkthrough by Nisha
CybersecurityOffensiveRed TeamPenetration Testing
Read more →
TryHackMe: Enumeration & Brute Force Room Walkthrough
TryHackMe: Enumeration & Brute Force Room Walkthrough
Penetration TestingEnumerationBrute ForceOSINT
Read more →
LazyAdmin TryHackMe Walkthrough
A complete walkthrough of the LazyAdmin room on TryHackMe, demonstrating enumeration, exploitation, and privilege escalation.
TryHackMeCTFPrivilege EscalationWeb Exploits
Read more →