Sign upSign InSign upSign InÖmer ErdalFollowSystem Weakness--ListenShareHello, everyone! I am here to lead you through a TryHackMe room that I found particularly captivating, titled &ls… Read More
The large-scale incorporation of connected OT/SCADA systems is a growing trend but are you aware of the increasing presence of sophisticated threat actors and rapidly budding ransomware vari… Read More
Before getting into the Attacking and Exploitation, it is recommended to know the difference between vSphere, vCenter and ESXI/ESX hosts. VMware vSphere: VMware vSphere is the nam… Read More
- Demand ransom in Bitcoin to access important data and not leak it - Encrypts data with tools such as phishing emails, downloads and remote desktop access - Cyber Agency of I… Read More
The term ransomware word perfectly captures the idea behind it, i.e. holding a computer system or software captive until a ransom is paid. Traditionally, attackers use ransomware to target i… Read More
Since the lockdown huge portion of employees working remotely through personal devices to access sensitive organization computers Windows’ Remote Desktop Protocol (RDP). RDP is a propr… Read More
LastPass Hackers Stole Source Code
(published: August 26, 2022)
Background:
In August 2022, an unidentified threat actor gained access to portions of the password management giant LastPass d… Read More
Network Pivoting using SSH tunneling and forwarding:
Is Microsoft Network Monitor was installed? If so, depending on which version, you may have to run netmon, netcap, or n… Read More
Honeypots
Database Honeypots
Delilah – Elasticsearch Honeypot written in Python (originally from Novetta).
ESPot – Elasticsearch honeypot written in NodeJS, to capture… Read More
Lockdown one year on: what did we learn about remote working?Securing millions of newly remote workers almost overnight was a huge undertaking. Against the need to keep businesses and esse… Read More
The North Korean advanced persistent threat (APT) group known as Kimsuky is actively attacking commercial-sector businesses, often by posing as South Korean reporters, according to an alert… Read More
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued an advisory after spotting advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities c… Read More
Using HTTP redirects for mitigating attacks
I like Wordfence, it gets the job done and works fine the way I see it.I’m cheap and/or lazy so I just use the free version of it (yep, I… Read More
While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major internati… Read More
Network Pivoting using SSH tunneling and forwarding:
Setup used for this tutorial:
Attacker IP: 192.168.1.100
Victim IP: 192.168.1.200 , second NIC 172.16.1.73 (connected to 172.16.1.0/24 n… Read More