Skip to main content

Cybersecurity

loading · loading ·

2025

OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins· loading · loading
Challenges Cybersecurity TryHackMe OSINT TryHackMe Cybersecurity ExifTool Burp Suite
#🕵️‍♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins· loading · loading
Cybersecurity Splunk Threat Hunting DNS Analysis Splunk SIEM Threat Intelligence DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.
Risk Analysis and Risk Assessment
·6536 words·31 mins· loading · loading
Cybersecurity Risk Assessment Risk Analysis Risk Analysis Risk Assessment Cybersecurity
Botany risk analysis by kelvin kiplagat # Contents
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide
·1802 words·9 mins· loading · loading
Cybersecurity Virtualization VMware LUKS Encryption Virtual Machine Security Cybersecurity
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide # INTRODUCTION # This documentation provides a step-by-step guide to configuring and securing a virtual machine (VM) using VMware.
Unveiling Network Vulnerabilities: A Penetration Testing Journey with Nmap and Metasploit
·1434 words·7 mins· loading · loading
Cybersecurity Penetration Testing Ethical Hacking Nmap Metasploit Penetration Testing Vulnerability Assessment CyberTech Solutions
Explore how to perform network vulnerability assessments using Nmap and Metasploit, including scanning, identifying vulnerabilities, and exploitation.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1245 words·6 mins· loading · loading
Cybersecurity Vulnerability Assessment Vulnerability Scanning Cybersecurity Penetration Testing Network Security Ethical Hacking
A hands-on guide to vulnerability scanning, covering practical techniques to identify and mitigate security weaknesses in systems and networks.
Report on Brute-Force Attack Simulation and Defensive Measures
·1555 words·8 mins· loading · loading
Cybersecurity Penetration Testing Ethical Hacking Brute-Force Attack John the Ripper Password Security Defensive Measures Encryption
This report covers a brute-force attack simulation using John the Ripper, defensive measures, and the importance of strong passwords and encryption.
Leveraging Nmap for Network Discovery and Vulnerability Assessment: A Comprehensive Lab Walkthrough
·2493 words·12 mins· loading · loading
Cybersecurity Network Security Ethical Hacking Nmap Network Discovery Vulnerability Assessment Cybersecurity Penetration Testing
This lab walkthrough demonstrates how to use Nmap for network discovery, OS fingerprinting, and vulnerability assessment, essential for both red and blue teams.
CyberTech Solutions Network Segmentation Plan for IoT and SCADA Devices
·681 words·4 mins· loading · loading
Cybersecurity Network Security Network Segmentation IoT Security SCADA Security Cybersecurity Industrial Security
A comprehensive network segmentation plan for securing IoT and SCADA devices, mitigating risks, and protecting critical business systems.
Cybersecurity Incident Analysis: Lessons for SMEs
·656 words·4 mins· loading · loading
Cybersecurity SME Security Incident Response Cybersecurity Breach SME Threat Analysis Incident Response CyberTech Solutions
An in-depth analysis of a recent cybersecurity incident affecting an SME, examining its causes, impact, and recommendations to prevent similar breaches.