Cybersecurity
loading
·
loading
·
2025
OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins·
loading
·
loading
Challenges
Cybersecurity
TryHackMe
OSINT
TryHackMe
Cybersecurity
ExifTool
Burp Suite
#🕵️♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
DHCP Log Analysis Using Splunk
·1383 words·7 mins·
loading
·
loading
SIEM
Threat Hunting
Splunk
DHCP Logs
Log Analysis
Cybersecurity
Analyzing DHCP Log Files Using Splunk SIEM # Introduction # Dynamic Host Configuration Protocol (DHCP) log files contain valuable information about IP address assignments, lease durations, client requests, and server responses.
Risk Analysis and Risk Assessment
·6536 words·31 mins·
loading
·
loading
Cybersecurity
Risk Assessment
Risk Analysis
Risk Analysis
Risk Assessment
Cybersecurity
Botany risk analysis by kelvin kiplagat # Contents
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide
·1802 words·9 mins·
loading
·
loading
Cybersecurity
Virtualization
VMware
LUKS Encryption
Virtual Machine Security
Cybersecurity
Securing a Virtual Machine with LUKS Encryption and Best Practices on VMware: A Step-by-Step Guide # INTRODUCTION # This documentation provides a step-by-step guide to configuring and securing a virtual machine (VM) using VMware.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1245 words·6 mins·
loading
·
loading
Cybersecurity
Vulnerability Assessment
Vulnerability Scanning
Cybersecurity
Penetration Testing
Network Security
Ethical Hacking
A hands-on guide to vulnerability scanning, covering practical techniques to identify and mitigate security weaknesses in systems and networks.
Leveraging Nmap for Network Discovery and Vulnerability Assessment: A Comprehensive Lab Walkthrough
·2493 words·12 mins·
loading
·
loading
Cybersecurity
Network Security
Ethical Hacking
Nmap
Network Discovery
Vulnerability Assessment
Cybersecurity
Penetration Testing
This lab walkthrough demonstrates how to use Nmap for network discovery, OS fingerprinting, and vulnerability assessment, essential for both red and blue teams.
CyberTech Solutions Network Segmentation Plan for IoT and SCADA Devices
·681 words·4 mins·
loading
·
loading
Cybersecurity
Network Security
Network Segmentation
IoT Security
SCADA Security
Cybersecurity
Industrial Security
A comprehensive network segmentation plan for securing IoT and SCADA devices, mitigating risks, and protecting critical business systems.
Understanding Public Key Infrastructure (PKI) and Certificate Management for Secure Web Transactions
·1661 words·8 mins·
loading
·
loading
Cybersecurity
Network Security
PKI
Certificate Management
Cybersecurity
Encryption
SSL/TLS
understanding Public Key Infrastructure (PKI) and Certificate Management for Secure Web Transactions # Public Key Infrastructure (PKI) and Certificate Management
Vulnversity
·1123 words·6 mins·
loading
·
loading
Cybersecurity
Penetration Testing
Capture the Flag
Cybersecurity
Penetration Testing
CTF
Privilege Escalation
Enumeration
Metasploit
Nmap
A walkthrough of the ‘Vulnversity’ CTF challenge, covering enumeration, exploitation, and privilege escalation.
Uncovering System Weaknesses: A Practical Approach to Vulnerability Scanning
·1246 words·6 mins·
loading
·
loading
Cybersecurity
Network Security
Penetration Testing
Digital Forensics
Cybersecurity
MITM Attack
Nessus
Network Security
ARP Spoofing
Penetration Testing
Nmap
A hands-on guide to uncovering system weaknesses through vulnerability scanning, using tools like Nessus and Nmap.