Blog

IT Security Resume WorkOut Plan

The demand for Information Technology (IT) Security professionals is growing at a crazy speed because of the various breaches. Organizations are looking for  bright and resourceful personnel to fill these positions. This ultimately is driving  recruitment of professional IT Security talent on a daily basis to the point that almost all colleges have an IT […]

Read More

DC1:1 VulnHUB Walkthrough

From the people who brought you WHAT THE CTF, CyberGuider is please to present its official walkthrough of DC1:1 from VulnHUB. This system was a lot of fun and shows that simple misconfigurations can cause the system to be compromised. Here is how we started…. RECON PHASE Of course with a NMAP scan, you know […]

Read More

Bypassing AV (Windows Defender) … Cat vs. Mouse

In the last post https://www.cyberguider.com/bypassing-windows-defender-the-tedious-way/ we found that Windows Defender uses a black list to stop known hacking tools such as Mimikatz. We were able to easily bypass the restriction with some word replacements but it took time, trail and error. In this post we are going to make that process much easier. As with […]

Read More

So you want to be a hacker?

Most of the time I’m binge watching Netflix, Amazon Prime, Hulu, or some other instant gratification media platform. But on the rare occasion that I’m out in these streets and talking to other professionals, the conversation always ends up at “So what do you do?”. I guess this is one of the default topics of […]

Read More

You’re too easy…

The average computer user does not think much about the amount of information he or she shares with others whether in-person, online or at random venues. They just want to be seen and heard because that is how the world works now. If you are not connected to a social media entity, you, my friend, […]

Read More

Your PORN DOES NOT IMPRESS US!!

Often times as information technology (IT) security professionals (a.k.a. Security Pros), we meet others who are interested in what we do for a living. The transfer of knowledge serves as a good way to promote IT security and often kick-starts an impromptu IT security awareness discussion. However this brings more than its average share of […]

Read More

Where do you fit in the realm of Information Security field?

Today’s job market has seen a dramatic growth in the information security arena and emphasis on the importance of personal and technical security. For example, identify theft, web attacks and information leakage, such as WikiLeaks and NASA have garnered international attention. These incidents have fueled the job market demands for more information security professionals. Potential […]

Read More

Why is my Doctor trying to KILL ME?

As I sat waiting on the examination table to begin my annual physical, I browsed the Internet from my iPhone on the office’s FREE Wi-Fi. At the time I thought, this is the worse, but then I heard screaming from a nearby room. My doctor walked into my room prepared and ready to go with […]

Read More