In this article, we will be using Disk Drive Signature to identify any suspicious changes in systems’ directories or files. Creating such signatures can help
In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Every time you do anything on your Windows system,
Today we are going to crack this vulnerable machine called Maskcrafter: 1.1. It is created by evdaez. It is a simple Boot to root kind
In this part of our lab series, we continue exploring AlienVault End User Devices Integration by setting up Windows and Linux endpoints for centralized monitoring.
In this guide, we delve into the SIEM Lab Setup AlienVault, focusing on deploying AlienVault OSSIM to monitor system security events, assess vulnerabilities, and perform
In this article, we will utilize the quick incident response tools recorded beneath to gather information. All these tools are a few of the greatest
Today we are going to solve another boot2root challenge called “Tempus: 3“. It’s available at VulnHub for penetration testing and you can download it from
In this article, we will learn the technique of Defense Evasion using the PowerShell Empire. PowerShell Empire is one of my favourite Post Exploitation tools
Today we are going to solve another boot2root challenge called “Insanity: 1“. It’s available at VulnHub for penetration testing and you can download it from