Cybersecurity
loading
·
loading
·
2025
OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins·
loading
·
loading
Challenges
Cybersecurity
TryHackMe
OSINT
TryHackMe
Cybersecurity
ExifTool
Burp Suite
#🕵️♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins·
loading
·
loading
Cybersecurity
Splunk
Threat Hunting
DNS Analysis
Splunk SIEM
Threat Intelligence
DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.
Risk Analysis and Risk Assessment
·6536 words·31 mins·
loading
·
loading
Cybersecurity
Risk Assessment
Risk Analysis
Risk Analysis
Risk Assessment
Cybersecurity
Botany risk analysis by kelvin kiplagat # Contents
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide
·1802 words·9 mins·
loading
·
loading
Cybersecurity
Virtualization
VMware
LUKS Encryption
Virtual Machine Security
Cybersecurity
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide # INTRODUCTION # This documentation provides a step-by-step guide to configuring and securing a virtual machine (VM) using VMware.
Unveiling Network Vulnerabilities: A Penetration Testing Journey with Nmap and Metasploit
·1434 words·7 mins·
loading
·
loading
Cybersecurity
Penetration Testing
Ethical Hacking
Nmap
Metasploit
Penetration Testing
Vulnerability Assessment
CyberTech Solutions
Explore how to perform network vulnerability assessments using Nmap and Metasploit, including scanning, identifying vulnerabilities, and exploitation.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1245 words·6 mins·
loading
·
loading
Cybersecurity
Vulnerability Assessment
Vulnerability Scanning
Cybersecurity
Penetration Testing
Network Security
Ethical Hacking
A hands-on guide to vulnerability scanning, covering practical techniques to identify and mitigate security weaknesses in systems and networks.
Report on Brute-Force Attack Simulation and Defensive Measures
·1555 words·8 mins·
loading
·
loading
Cybersecurity
Penetration Testing
Ethical Hacking
Brute-Force Attack
John the Ripper
Password Security
Defensive Measures
Encryption
This report covers a brute-force attack simulation using John the Ripper, defensive measures, and the importance of strong passwords and encryption.
Leveraging Nmap for Network Discovery and Vulnerability Assessment: A Comprehensive Lab Walkthrough
·2493 words·12 mins·
loading
·
loading
Cybersecurity
Network Security
Ethical Hacking
Nmap
Network Discovery
Vulnerability Assessment
Cybersecurity
Penetration Testing
This lab walkthrough demonstrates how to use Nmap for network discovery, OS fingerprinting, and vulnerability assessment, essential for both red and blue teams.
CyberTech Solutions Network Segmentation Plan for IoT and SCADA Devices
·681 words·4 mins·
loading
·
loading
Cybersecurity
Network Security
Network Segmentation
IoT Security
SCADA Security
Cybersecurity
Industrial Security
A comprehensive network segmentation plan for securing IoT and SCADA devices, mitigating risks, and protecting critical business systems.
Cybersecurity Incident Analysis: Lessons for SMEs
·656 words·4 mins·
loading
·
loading
Cybersecurity
SME Security
Incident Response
Cybersecurity Breach
SME
Threat Analysis
Incident Response
CyberTech Solutions
An in-depth analysis of a recent cybersecurity incident affecting an SME, examining its causes, impact, and recommendations to prevent similar breaches.