Category Archives: Vulnerability Management

OpenFyah – Windows Privilege Escalation

On a recent internal penetration test, the clients goals were to gauge what an internal user or attacker could achieve with user level access to their network. In these cases you want to look for known exploits, weak passwords and miss-configurations. This one fell into the miss-configuration bucket. Its not an issue with the software […]

Read More

WarZone2 – VulnHub WriteUp

We do not know all things Penetration Testing or Hacking but what we do know is OUR WILLINGNESS to constantly share what we know with you. They are probably better ways to hack the VulnHub WarZone2 Virtual Machine (VM) by AL1ENUM, but here is our take on WarZone2. Today we are doing a walk through […]

Read More

Hogwarts – VulnHub WriteUp

As a Penetration Tester, the constant need to practice our skills is required to improve our penetration testing (PT) abilities. Thus making this process a deliberate and willful one in order to be better at our craft. As a result, this write up serves our practicing and sharing. This walk-through will guide you as you […]

Read More

About Us

CyberGuider Information Technology Services Inc. is a top-notch establishment in the technology industry. Its principal responsibility is to ensure that clients are covered and satisfied by successfully supporting the improvement of their IT Security and Compliance program with an efficient and cost-benefit approach. Whether the requirements are for FISMA, NIST, FedRAMP, CMMC or other compliance […]

Read More

Outreach Program

Many people or organizations are unaware of the risk of cyber threat, leaving their businesses vulnerable to attack. As a result, we decided to create a platform as a path to the community; with the goal of educating individuals through Awareness training, workshops, and seminars. CyberGuider offers free basic mentorship to interested individuals.  We have […]

Read More

DC1:1 – VulnHub WriteUp

From the people who brought you WHAT THE CTF, CyberGuider is please to present its official walkthrough of DC1:1 from VulnHUB. This system was a lot of fun and shows that simple misconfigurations can cause the system to be compromised. Here is how we started…. RECON PHASE Of course with a NMAP scan, you know […]

Read More

Bypassing AV (Windows Defender) … Cat vs. Mouse

In the last post https://www.cyberguider.com/bypassing-windows-defender-the-tedious-way/ we found that Windows Defender uses a black list to stop known hacking tools such as Mimikatz. We were able to easily bypass the restriction with some word replacements but it took time, trail and error. In this post we are going to make that process much easier. As with […]

Read More

Bypassing AV (Windows Defender) … the tedious way.

I was on a penetration test when i was able to acquire a set of admin credentials. This wasn’t a red team engagement, so there was no issues lighting up their AV with some of our tools but I always try to stay as silent as possible until close to the end or the assessment. […]

Read More