In the game of network security, you are either secure or you are not; there exists no middle ground. If a computer is connected to
Today we’re going to solve another boot2root challenge called “Ghizer“. It’s available at TryHackMe for penetration testing practice. This lab is not difficult if we
In the world of application security, one of the lesser-known yet highly critical vulnerabilities is the XXE Injection attack (XML External Entity Injection). This attack
In this guide, we explore DNScat2 Application Layer Command and Control, a method for using DNS to establish covert communication channels. By setting up DNScat2,
In today’s rapidly evolving cybersecurity landscape, proactive detection is more critical than ever. AlienVault Threat Hunting empowers security professionals to identify and investigate suspicious activities
Honeypots are generally hardware or software that are deployed by the security departments of any organization to examine the threats that are possessed by the
Today we’re going to solve another boot2root challenge called “0day“. It’s available at TryHackMe for penetration testing practice. This lab is not difficult if we
In this article, we will provide the write-up of the Try Hack Me Room: The Server from hell. This is a write-up about a medium
Today we’re going to solve another boot2root challenge called “Revenge”. It’s available at TryHackMe for penetration testing practice. This lab is not difficult if we