Threat Hunting: Log Monitoring Lab Setup with ELK
Elastic Stack is formerly known as the ELK Stack. Elk Stack is a collection of free opensource software from Elastic Company which is specially designed for centralized logging. It allows the...
View ArticleForensic Investigation: Autopsy Forensic Browser in Linux
Introduction Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is an open-source tool for digital forensics which was developed...
View ArticlePhotographer 1: Vulnhub Walkthrough
Today, in this article we are going to gain the root access of an easy level machine called “Photographer 1” which is available at Vulnhub for penetration testing and you can download it from here. The...
View ArticleCross-Site Scripting Exploitation
“Are you one of them, who thinks that Cross-Site Scripting is just for some errors or pop-ups on the screen?” Yes?? Then today in this article, you’ll see how an XSS suffering web-page is not only...
View ArticleIncident Response: Windows Cheatsheet
For some people who use their computer systems, their systems might seem normal to them, but they might never realise that there could be something really phishy or even that fact that their systems...
View ArticleThreat Intelligence: MISP Lab Setup
MISP is an open-source Threat intelligence and sharing platform (formerly known as Malware Information Sharing Platform) that is used for collecting, storing distributing and sharing cybersecurity...
View ArticleIncident Response- Linux Cheatsheet
Detecting any intrusion in your system is a very important step towards Incident response. Incident response is quite vast, but it is always better to start small. While performing incident response,...
View ArticleCredential Dumping: Fake Services
Have you ever heard about Fake services? Credential dumping can be performed by exploiting open ports like ftp, telnet, smb, etc. to gain sensitive data like usernames and passwords. Table of Contents...
View ArticleAnti-Forensic: Swipe Footprint with Timestomp
In this article, we will learn how we can swipe our footprint after hacking the victim’s system. We can achieve that with the help of the Timestomp feature provided by Metasploit Framework. Let’s...
View ArticleDMV :1 Vulnhub Walkthrough
CTF’s are one of the best and probably the fun way to get hands-on pen testing experience. This one, in particular, is a great CTF from Vulnhub which uses aspects of web penetration testing like file...
View ArticleSIEM: Log Monitoring Lab Setup with Splunk
Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a...
View ArticleDefense Evasion: Alternate Data Streams
Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could provide compatibility for file sharing with...
View ArticleFirewall Lab Setup: Untangle
What is a Firewall? a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes...
View ArticleIncident Response: Windows Account Management Event (Part 1)
For a system to perform well and ensure its maintenance, it is extremely important to monitor and manage events on a system. Event Logs are part of the Windows system, that are created by on a system...
View ArticleIncident Response: Windows Account Management Event (Part 2)
For a system to perform well and ensure its maintenance, it is extremely important to monitor and manage events on a system. Event Logs are part of the Windows system, that are created by on a system...
View ArticlePenetration Testing on CouchDB (5984)
What is CouchDB CouchDB is a Free and open-source fault-tolerant NoSQL database developed by Apache software foundation. It uses JSON, to store data, javascript as its query languages and It includes...
View ArticleThreat Hunting: Velociraptor for Endpoint Monitoring
Velociraptor is a tool for collecting host-based state information using Velocidex Query Language (VQL) queries. To learn more about Velociraptor, read the documentation on...
View ArticleIncident Response: Windows Account Logon and logon Events
A user when authenticates a Windows endpoint, then an Account Logon event will be generated and will be recorded. These account logon events will be recorded in the Security event log of the system...
View ArticleData Exfiltration using Linux Binaries
Have you ever heard about your critical data being exported somewhere else without your knowledge? Data exfiltration is a method of breaching the security and having illegal access over the data of the...
View ArticleUnderstanding the CSRF Vulnerability (A Beginner’s Guide)
You always change your account’s password when you desire for, but what, if your password is changed whenever the attacker wants, and that if when you are not aware with it? Today in this article,...
View Article