Category Archives: Vulnerability Management

Jetty 1 – VulnHub WriteUp

It’s that time again when we challenge our skills in an effort to learn something new daily and VulnHub as provided yet again. Jetty 1 by MrSquid; gave us the opportunity to pay attention to details and use cool tools. Let’s jump in but before we do so, Please read the warning below. Public Service […]

Read More

OpenFyah – Windows Privilege Escalation

On a recent internal penetration test, the clients goals were to gauge what an internal user or attacker could achieve with user level access to their network. In these cases you want to look for known exploits, weak passwords and miss-configurations. This one fell into the miss-configuration bucket. Its not an issue with the software […]

Read More

WarZone2 – VulnHub WriteUp

We do not know all things Penetration Testing or Hacking but what we do know is OUR WILLINGNESS to constantly share what we know with you. They are probably better ways to hack the VulnHub WarZone2 Virtual Machine (VM) by AL1ENUM, but here is our take on WarZone2. Today we are doing a walk through […]

Read More

Hogwarts – VulnHub WriteUp

As a Penetration Tester, the constant need to practice our skills is required to improve our penetration testing (PT) abilities. Thus making this process a deliberate and willful one in order to be better at our craft. As a result, this write up serves our practicing and sharing. This walk-through will guide you as you […]

Read More

About Us

CyberGuider Information Technology Services Inc. is a top-notch establishment in the technology industry. Its principal responsibility is to ensure that clients are covered and satisfied by successfully supporting the improvement of their IT Security and Compliance program with an efficient and cost-benefit approach. Whether the requirements are for FISMA, NIST, FedRAMP, CMMC-AB or other compliance […]

Read More

Outreach Program

Many people or organizations are unaware of the risk of cyber threat, leaving their businesses vulnerable to attack. As a result, we decided to create a platform as a path to the community; with the goal of educating individuals through Awareness training, workshops, and seminars. CyberGuider offers free basic mentorship to interested individuals.  We have […]

Read More

DC1:1 – VulnHub WriteUp

From the people who brought you WHAT THE CTF, CyberGuider is please to present its official walkthrough of DC1:1 from VulnHUB. This system was a lot of fun and shows that simple misconfigurations can cause the system to be compromised. Here is how we started…. RECON PHASE Of course with a NMAP scan, you know […]

Read More

Bypassing AV (Windows Defender) … Cat vs. Mouse

In the last post https://www.cyberguider.com/bypassing-windows-defender-the-tedious-way/ we found that Windows Defender uses a black list to stop known hacking tools such as Mimikatz. We were able to easily bypass the restriction with some word replacements but it took time, trail and error. In this post we are going to make that process much easier. As with […]

Read More

Translate »