Posts
2025
TryHackMe: Billing Walkthrough
·802 words·4 mins·
loading
·
loading
CTF Writeups
TryHackMe
TryHackMe
CTF
Billing
Linux
Enumeration
Walkthrough
TryHackMe Billing Room Walkthrough Deep Dive into MagnusBilling Exploitation and Privilege Escalation # The TryHackMe “Billing” room is referred to as easy but it took me days to break through.
OverTheWire: Bandit Walkthrough (Levels 0–34)
·1827 words·9 mins·
loading
·
loading
CTF Writeups
OverTheWire
OverTheWire
Bandit
CTF
Linux
Beginner
Walkthrough
OverTheWire Bandit Writeup (Level 0 to 15) # If you’re starting with cybersecurity, OverTheWire’s Bandit is a great place to learn.
OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins·
loading
·
loading
Challenges
Cybersecurity
TryHackMe
OSINT
TryHackMe
Cybersecurity
ExifTool
Burp Suite
#🕵️♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
DHCP Log Analysis Using Splunk
·1383 words·7 mins·
loading
·
loading
SIEM
Threat Hunting
Splunk
DHCP Logs
Log Analysis
Cybersecurity
Analyzing DHCP Log Files Using Splunk SIEM # Introduction # Dynamic Host Configuration Protocol (DHCP) log files contain valuable information about IP address assignments, lease durations, client requests, and server responses.
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins·
loading
·
loading
Cybersecurity
Splunk
Threat Hunting
DNS Analysis
Splunk SIEM
Threat Intelligence
DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.
Risk Analysis and Risk Assessment
·6536 words·31 mins·
loading
·
loading
Cybersecurity
Risk Assessment
Risk Analysis
Risk Analysis
Risk Assessment
Cybersecurity
Botany risk analysis by kelvin kiplagat # Contents
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide
·1802 words·9 mins·
loading
·
loading
Cybersecurity
Virtualization
VMware
LUKS Encryption
Virtual Machine Security
Cybersecurity
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide # INTRODUCTION # This documentation provides a step-by-step guide to configuring and securing a virtual machine (VM) using VMware.
Unveiling Network Vulnerabilities: A Penetration Testing Journey with Nmap and Metasploit
·1434 words·7 mins·
loading
·
loading
Cybersecurity
Penetration Testing
Ethical Hacking
Nmap
Metasploit
Penetration Testing
Vulnerability Assessment
CyberTech Solutions
Explore how to perform network vulnerability assessments using Nmap and Metasploit, including scanning, identifying vulnerabilities, and exploitation.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1245 words·6 mins·
loading
·
loading
Cybersecurity
Vulnerability Assessment
Vulnerability Scanning
Cybersecurity
Penetration Testing
Network Security
Ethical Hacking
A hands-on guide to vulnerability scanning, covering practical techniques to identify and mitigate security weaknesses in systems and networks.
Report on Brute-Force Attack Simulation and Defensive Measures
·1555 words·8 mins·
loading
·
loading
Cybersecurity
Penetration Testing
Ethical Hacking
Brute-Force Attack
John the Ripper
Password Security
Defensive Measures
Encryption
This report covers a brute-force attack simulation using John the Ripper, defensive measures, and the importance of strong passwords and encryption.