Skip to main content

Posts

2025

TryHackMe: Billing Walkthrough
·802 words·4 mins· loading · loading
CTF Writeups TryHackMe TryHackMe CTF Billing Linux Enumeration Walkthrough
TryHackMe Billing Room Walkthrough Deep Dive into MagnusBilling Exploitation and Privilege Escalation # The TryHackMe “Billing” room is referred to as easy but it took me days to break through.
OverTheWire: Bandit Walkthrough (Levels 0–34)
·1827 words·9 mins· loading · loading
CTF Writeups OverTheWire OverTheWire Bandit CTF Linux Beginner Walkthrough
OverTheWire Bandit Writeup (Level 0 to 15) # If you’re starting with cybersecurity, OverTheWire’s Bandit is a great place to learn.
OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins· loading · loading
Challenges Cybersecurity TryHackMe OSINT TryHackMe Cybersecurity ExifTool Burp Suite
#🕵️‍♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
DHCP Log Analysis Using Splunk
·1383 words·7 mins· loading · loading
SIEM Threat Hunting Splunk DHCP Logs Log Analysis Cybersecurity
Analyzing DHCP Log Files Using Splunk SIEM # Introduction # Dynamic Host Configuration Protocol (DHCP) log files contain valuable information about IP address assignments, lease durations, client requests, and server responses.
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins· loading · loading
Cybersecurity Splunk Threat Hunting DNS Analysis Splunk SIEM Threat Intelligence DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.
Risk Analysis and Risk Assessment
·6536 words·31 mins· loading · loading
Cybersecurity Risk Assessment Risk Analysis Risk Analysis Risk Assessment Cybersecurity
Botany risk analysis by kelvin kiplagat # Contents
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide
·1802 words·9 mins· loading · loading
Cybersecurity Virtualization VMware LUKS Encryption Virtual Machine Security Cybersecurity
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide # INTRODUCTION # This documentation provides a step-by-step guide to configuring and securing a virtual machine (VM) using VMware.
Unveiling Network Vulnerabilities: A Penetration Testing Journey with Nmap and Metasploit
·1434 words·7 mins· loading · loading
Cybersecurity Penetration Testing Ethical Hacking Nmap Metasploit Penetration Testing Vulnerability Assessment CyberTech Solutions
Explore how to perform network vulnerability assessments using Nmap and Metasploit, including scanning, identifying vulnerabilities, and exploitation.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1245 words·6 mins· loading · loading
Cybersecurity Vulnerability Assessment Vulnerability Scanning Cybersecurity Penetration Testing Network Security Ethical Hacking
A hands-on guide to vulnerability scanning, covering practical techniques to identify and mitigate security weaknesses in systems and networks.
Report on Brute-Force Attack Simulation and Defensive Measures
·1555 words·8 mins· loading · loading
Cybersecurity Penetration Testing Ethical Hacking Brute-Force Attack John the Ripper Password Security Defensive Measures Encryption
This report covers a brute-force attack simulation using John the Ripper, defensive measures, and the importance of strong passwords and encryption.