Category Archives: Vulnerability Management

Outreach Program

As IT Security professionals, CyberGuider IT Services duty is to bridge the gap and ensure that our families, friends and community are engaged in proper IT Security procedures. Whether in the Community or Corporate Events, CyberGuider Outreach program serves as resource to help develop individuals, groups or organizations by providing IT Security Awareness training.

Read More

Knowledge Base

CyberGuider IT Services is pleased to share the resources we have gather over the years and provide recommendations based on that for IT Security such as: Training, Podcast, Tools, Capture The Flag (CTF) and a bit more. Capture The Flag (CTF) Full CTF List HackMe HackTheBox PentesterLab Pivot Project VulnHUB GitHub CBHUE Tools Droopescan Cobbr […]

Read More

DC1:1 VulnHUB Walkthrough

From the people who brought you WHAT THE CTF, CyberGuider is please to present its official walkthrough of DC1:1 from VulnHUB. This system was a lot of fun and shows that simple misconfigurations can cause the system to be compromised. Here is how we started…. RECON PHASE Of course with a NMAP scan, you know […]

Read More

Bypassing AV (Windows Defender) … Cat vs. Mouse

In the last post https://www.cyberguider.com/bypassing-windows-defender-the-tedious-way/ we found that Windows Defender uses a black list to stop known hacking tools such as Mimikatz. We were able to easily bypass the restriction with some word replacements but it took time, trail and error. In this post we are going to make that process much easier. As with […]

Read More

Bypassing AV (Windows Defender) … the tedious way.

I was on a penetration test when i was able to acquire a set of admin credentials. This wasn’t a red team engagement, so there was no issues lighting up their AV with some of our tools but I always try to stay as silent as possible until close to the end or the assessment. […]

Read More

You’re too easy…

The average computer user does not think much about the amount of information he or she shares with others whether in-person, online or at random venues. They just want to be seen and heard because that is how the world works now. If you are not connected to a social media entity, you, my friend, […]

Read More

Your PORN DOES NOT IMPRESS US!!

Often times as information technology (IT) security professionals (a.k.a. Security Pros), we meet others who are interested in what we do for a living. The transfer of knowledge serves as a good way to promote IT security and often kick-starts an impromptu IT security awareness discussion. However this brings more than its average share of […]

Read More

Why is my Doctor trying to KILL ME?

As I sat waiting on the examination table to begin my annual physical, I browsed the Internet from my iPhone on the office’s FREE Wi-Fi. At the time I thought, this is the worse, but then I heard screaming from a nearby room. My doctor walked into my room prepared and ready to go with […]

Read More