Blog

Jetty 1 – VulnHub WriteUp

It’s that time again when we challenge our skills in an effort to learn something new daily and VulnHub as provided yet again. Jetty 1 by MrSquid; gave us the opportunity to pay attention to details and use cool tools. Let’s jump in but before we do so, Please read the warning below. Public Service […]

Read More

OpenFyah – Windows Privilege Escalation

On a recent internal penetration test, the clients goals were to gauge what an internal user or attacker could achieve with user level access to their network. In these cases you want to look for known exploits, weak passwords and miss-configurations. This one fell into the miss-configuration bucket. Its not an issue with the software […]

Read More

WarZone2 – VulnHub WriteUp

We do not know all things Penetration Testing or Hacking but what we do know is OUR WILLINGNESS to constantly share what we know with you. They are probably better ways to hack the VulnHub WarZone2 Virtual Machine (VM) by AL1ENUM, but here is our take on WarZone2. Today we are doing a walk through […]

Read More

Hogwarts – VulnHub WriteUp

As a Penetration Tester, the constant need to practice our skills is required to improve our penetration testing (PT) abilities. Thus making this process a deliberate and willful one in order to be better at our craft. As a result, this write up serves our practicing and sharing. This walk-through will guide you as you […]

Read More

Assemble Your Crew

Over the years, we constantly tell newcomers to the field of Information Technology (IT) Security to “GET INVOLVE” in the Security community, but do we truly tell them how or where to begin. If you are new to a field the last thing you want to be is a poser. In the past, CyberGuider has […]

Read More

IT Security Resume WorkOut Plan

The demand for Information Technology (IT) Security professionals is growing at a crazy speed because of the various breaches. Organizations are looking for  bright and resourceful personnel to fill these positions. This ultimately is driving  recruitment of professional IT Security talent on a daily basis to the point that almost all colleges have an IT […]

Read More

DC1:1 – VulnHub WriteUp

From the people who brought you WHAT THE CTF, CyberGuider is please to present its official walkthrough of DC1:1 from VulnHUB. This system was a lot of fun and shows that simple misconfigurations can cause the system to be compromised. Here is how we started…. RECON PHASE Of course with a NMAP scan, you know […]

Read More

Bypassing AV (Windows Defender) … Cat vs. Mouse

In the last post https://www.cyberguider.com/bypassing-windows-defender-the-tedious-way/ we found that Windows Defender uses a black list to stop known hacking tools such as Mimikatz. We were able to easily bypass the restriction with some word replacements but it took time, trail and error. In this post we are going to make that process much easier. As with […]

Read More

Bypassing AV (Windows Defender) … the tedious way.

I was on a penetration test when i was able to acquire a set of admin credentials. This wasn’t a red team engagement, so there was no issues lighting up their AV with some of our tools but I always try to stay as silent as possible until close to the end or the assessment. […]

Read More

Translate »