Introduction This report documents the findings of an engagement on Walking An Application room on the TryHackMe platform. The testing engagement was performed against an Ubuntu machine running an Nginx webserver. The machine provided by TryHackMe had a web application found on https://10-10-153-155.p.thmlabs.com/ which served as the main focus of the engagement. The purpose of …
CTI Cycle
It is hard to talk about any type of intelligence without mentioning the intelligence cycle. It is a method for delivering actionable intelligence to customers through a flexible stepwise process. Even though it is usually depicted as a cycle that moves in one circular motion, in reality it does not run so smoothly. At any …
CTI Adversary/Threat Actor
In the first article we defined Cyber Threat Intelligence (CTI) and we saw how it is very close to traditional intelligence with a couple of additional distinguishing factors. The most important of which was the focus on adversaries otherwise known as threat actors. Analysts research these adversaries by collecting and analyzing information about an adversary’s …
Introduction to Cyber Threat Intelligence
After gaining a little traction and releasing a tool review for AutoRecon, I decided I wanted to share my greatest passion and interest in cybersecurity and release a series of articles on Cyber Threat Intelligence (CTI). Even though it is still a fairly new field only emerging in 2011, it is based on the well-established …
THM – Cap Walkthrough
INTRODUCTION: Why I wrote this I want to demonstrate my passion and keenness for learning to fellow ethical hackers and potential employers. Any role I am considered for will require I rapidly learn, and the best way to do so is to show I can teach. For the sake of entertainment and being accessible, I’ve …
How to Test Your Hacking Skills Legally
How to Test Your Hacking/Pentesting Skills Legally? As a beginner in penetration testing, getting comfortable with your testing skills requires a lot of hands-on practice. Practice makes one perfect in whatever skills we set out to improve upon. That is why this article offers resources to help you test your technical skills in ethical hacking …
AutoRecon Tool Review
Recently, I have been studying for the Offensive Security Certified Professional (OSCP) exam and I have been trying to find some new ways to attack the recon and enumeration phase. This is something that has been an ongoing battle throughout my studies. I would run tool after tool and just always feel like my scans …
My Cyber Security Journey So Far – from an eJPT holder
Introduction Hello, friend. It’s been a while. The internet has been an ever-expanding and evolving technology that has become a critical part of our lives. As the world becomes more digitalized, so does the risk from external threats to our system and the security of our data. To combat this is a community of professions, …
Intro to Modbus
What Is It, How It Works, and Vulnerabilities & Scenario Hello HackHouse family! If you came to learn about the Modbus protocol, how it’s used, and how it has been attacked, you’re in the right place. This article is intended for beginners in the ICS (industrial control systems) security arena, as I am one myself. …
Free Virtual Cybersecurity Internships
Internships are beneficial in just about any industry, and cybersecurity is no different. There is an extreme shortage of qualified and experienced cybersecurity professionals. Internships are one way to get new and upcoming cybersecurity graduates the experience they need to enter into the workforce starting with entry-level positions. When it comes to cybersecurity internships, the …

