Keeping Your Network in Check: Unveiling the Power of Network Discovery ToolsMaintaining and Documenting NetworksApr 3, 2024Apr 3, 2024
SD-WAN Security, an introductionSD-WAN, short for Software-Defined Wide Area Networking, revolutionizes networking by offering a decentralized approach. It provides…Jan 27, 2024Jan 27, 2024
Simple Python script for exploiting IDOR-BOLA``` python3 -c ‘for i in range(1,2001): print(i)’ > num.txt ```Jul 11, 2023Jul 11, 2023
When installing Docker you get“failed to fetch”… BUT when you run sudo apt-get update you get…Issue 1: Outdated repo Issue 2: Key Signature verificationJul 11, 2023Jul 11, 2023
How to Install Docker and Docker Compose on Kali Linux### T0 check if docker is already installed ``docker — versionJul 11, 2023Jul 11, 2023
ISC2 Members New BenefitsAs an ISC2 member you get to have access to their new training launches as one of your benefits.Jul 5, 2023Jul 5, 2023
The SecOps Group Certified Network Security Practitioner CTFJust woke up on a Saturday morning. While aimlessly browsing through social media (yeah not a good practice), I chanced upon this post from…Jun 17, 2023Jun 17, 2023
More on the Awesome KC7 Foundation CTFBelow is a writeup (sort of) of Question 12 Section 6: Security Jeopardy REDUX. This is worth 300 points.Jun 12, 2023Jun 12, 2023
CTF for aspiring SOC EngineersYesterday, June 10, 2023 EST, KC7 (https://kc7cyber.com/) held an awesome capture-the-flag event. At first, I thought it was just like…Jun 11, 2023Jun 11, 2023
Unveiling the Power of C2 Servers: Orchestrating Cyber AttacksIn the ever-evolving landscape of cybercrime, criminals constantly seek innovative ways to exploit and control compromised systems. One…Jun 5, 2023Jun 5, 2023