SIEM: Windows Client Monitoring with Splunk
In our previous article, we have covered with Splunk master server setup with a brief demonstration of Dashboard setup or Log monitoring you can visit that article from here. Once done with a complete...
View ArticleUSB Forensics: Detection & Investigation
Universal Serial Bus flash drives, commonly known as USB flash drives are the most common storage devices which can be found as evidence in Digital Forensics Investigation. The digital forensic...
View ArticleForensic Investigation: Preserve Time Stamp
As a Digital Forensic Investigator, you might understand, how important it is to preserve timestamps of any evidence gathered at the scene of a crime. You will be on your toes to make sure that the...
View ArticleDocker for Pentester: Image Vulnerability Assessment
We are moving from virtualization to containerization and we are all familiar with the container services such as docking or quay.io. You can pick a dock image for a particular application by selecting...
View ArticleDigital Forensics: An Introduction
Digital Forensics is the application of scientific methods in preserving, recovering, and investigating digital evidence in a Digital crime scenario. It can be correctly defined as, collection,...
View ArticleDocker for Pentester: Abusing Docker API
As you know, docking services are booming, docking container attacks are also on the rise. But this post will illustrate how the intruder is trying to compromise the docker API due to a weak setup....
View ArticleCryptoBank: 1: Vulnhub Walkthrough
Introduction Today we are going to crack this vulnerable virtual machine called CryptoBank 1. It was created by emaragkos. This is a Capture the Flag type of challenge. It contains one flag that is...
View ArticleLoly: 1 Vulnhub Walkthrough
Hello Folks, in this article, we are going to solve a Capture the Flag (CTF) challenge of LOLY:1 from Vulnhub and the URL for this CTF is https://vulnhub.com/entry/loly-1,538/. This CTF is posted by...
View ArticleTomato: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called “Tomato: 1“. It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...
View ArticleChili: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called “Chili: 1“. It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...
View ArticleHealthcare: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called “HEALTHCARE 1”. It is developed to train student the art of penetration testing. The credit of making this lab goes to v1n1v131r4 and lab...
View ArticleShellDredd #1 Hannah Vulnhub Walkthrough
Today we will solve a new boot2root challenge named “ONSYSTEM: SHELLDREDD # 1 HANNAH“. For penetration testing, it is available on VulnHub and we can download it from here. The credit goes to d4t4s3c...
View ArticleStar Wars: 1 Vulnhub Walkthrough
Hi friends, Today I am going to share a writeup for gaining root access for the vulnhub machine “star-wars-ctf-1”. It contains one flag that is accessible after gaining root level privilege on the...
View ArticleCengBox: 2: Vulnhub Walkthrough
Introduction Today we are going to crack this vulnerable machine called CengBox: 2. It was created by Arslan Bilecen. This is a Capture the Flag type of challenge. It contains two flags that is...
View ArticleMercury: Vulnhub Walkthrough
Introduction Here is another Vulnerable machine called Mercury. It is available on vuln hub. Let’s move further towards this CTF challenge. There are two flags on the box: a user and root flag which...
View ArticleCewlkid: 1 Vulnhub Walkthrough
Today, we are going to solve another boot2root challenge called “Cewlkid: 1“. It is available at VulnHub for penetration testing practices and you can download it from here. The commendation of making...
View ArticleNyx: 1: Vulnhub Walkthrough
Introduction Today we are going to crack this vulnerable machine called Nyx: 1. It was created by 0xatom. You could contact him on Discord. This is a Capture the Flag type of challenge. It contains two...
View ArticleDigital Forensics: An Introduction (Part 2)
In the first part of this article, we have seen the Elements of a Digital Crime, Goals of Digital Forensic Investigation, Classification of Digital Forensics, Digital Evidence, Principles of Digital...
View ArticleThreat Hunting: Velociraptor for Endpoint Monitoring (Part 2)
In our previous article, we have covered with Velociraptor master server setup with a brief demonstration of Velociraptor installation, GUI interface set up with some of the forensics Artifacts If you...
View ArticleDurian: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called “Durian: 1“. It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...
View Article