Uncategorized

Walking an Application – THM Walkthrough

Introduction This report documents the findings of an engagement on Walking An Application room on the TryHackMe platform. The testing engagement was performed against an Ubuntu machine running an Nginx webserver. The machine provided by TryHackMe had a web application found on https://10-10-153-155.p.thmlabs.com/ which served as the main focus of the engagement. The purpose of […]

Walking an Application – THM Walkthrough Read More »

CTI Cycle

It is hard to talk about any type of intelligence without mentioning the intelligence cycle. It is a method for delivering actionable intelligence to customers through a flexible stepwise process. Even though it is usually depicted as a cycle that moves in one circular motion, in reality it does not run so smoothly. At any

CTI Cycle Read More »

CTI Adversary/Threat Actor

In the first article we defined Cyber Threat Intelligence (CTI) and we saw how it is very close to traditional intelligence with a couple of additional distinguishing factors. The most important of which was the focus on adversaries otherwise known as threat actors. Analysts research these adversaries by collecting and analyzing information about an adversary’s

CTI Adversary/Threat Actor Read More »

AutoRecon Tool Review

Recently, I have been studying for the Offensive Security Certified Professional (OSCP) exam and I have been trying to find some new ways to attack the recon and enumeration phase. This is something that has been an ongoing battle throughout my studies. I would run tool after tool and just always feel like my scans

AutoRecon Tool Review Read More »

Intro to Modbus

What Is It, How It Works, and Vulnerabilities & Scenario Hello HackHouse family! If you came to learn about the Modbus protocol, how it’s used, and how it has been attacked, you’re in the right place. This article is intended for beginners in the ICS (industrial control systems) security arena, as I am one myself.

Intro to Modbus Read More »

Free Virtual Cybersecurity Internships

Internships are beneficial in just about any industry, and cybersecurity is no different. There is an extreme shortage of qualified and experienced cybersecurity professionals. Internships are one way to get new and upcoming cybersecurity graduates the experience they need to enter into the workforce starting with entry-level positions. When it comes to cybersecurity internships, the

Free Virtual Cybersecurity Internships Read More »

Scroll to Top
Scroll to Top