Tag IT security

HTB: ACTIVE

CyberGuider writeup of retired "ACTIVE" box - about enumerating ACTIVE Directory and use Kerberoasting to find Admin creds for service acct.

HTB: ACCESS

CyberGuider IT Services writeup of "Retired" HackTheBox (HTB) system "ACCESS". Access is an EASY level of difficulty machine we completed.

Hackable: II – VulnHub WriteUp

VulnHub has provided another teaching moment called Hackable: II by Elias Sousa; giving us the opportunity to develop existing skills, using cool tools and learning new concepts Let’s jump in but before we do so, Please read the warning below.…

Jetty 1 – VulnHub WriteUp

It’s that time again when we challenge our skills in an effort to learn something new daily and VulnHub has provided an opportunity yet again. Jetty 1 by MrSquid; giving us the opportunity to pay attention to details and use…

WarZone2 – VulnHub WriteUp

We may not know all things about penetration testing or hacking but what we do know is OUR WILLINGNESS to constantly share what we know with you. They are probably better ways to hack the VulnHub WarZone2 Virtual Machine (VM)…

Hogwarts – VulnHub WriteUp

As a Penetration Tester, the constant need to practice our skills is required in order to improve our penetration testing (PT) abilities. Thus, making this process a deliberate and willful one in order to be better at our craft, as…

Assemble Your Crew

Over the years, we constantly tell newcomers to the field of Information Technology (IT) Security to “GET INVOLVED” in the security community, but do we truly tell them how or where to begin? If you are new to a field…

So you want to be a hacker?

Most of the time I am binge watching Netflix, Amazon Prime, Hulu, or some other instant gratification media platform. On the rare occasion that I’m out in these streets and talking to other professionals, the conversation always ends up at…

Your PORN DOES NOT IMPRESS US!!

Often times as information technology (IT) security professionals (a.k.a. Security Pros), we meet others who are interested in what we do for a living. The transfer of knowledge serves as a good way to promote IT security and often kick-starts…

Verified by MonsterInsights