CTI Adversary/Threat Actor

In the first article we defined Cyber Threat Intelligence (CTI) and we saw how it is very close to traditional intelligence with a couple of additional distinguishing factors. The most important of which was the focus on adversaries otherwise known as threat actors. Analysts research these adversaries by collecting and analyzing information about an adversary’s …

THM – Cap Walkthrough

INTRODUCTION: Why I wrote this I want to demonstrate my passion and keenness for learning to fellow ethical hackers and potential employers. Any role I am considered for will require I rapidly learn, and the best way to do so is to show I can teach.  For the sake of entertainment and being accessible, I’ve …

How to Test Your Hacking Skills Legally

How to Test Your Hacking/Pentesting Skills Legally? As a beginner in penetration testing, getting comfortable with your testing skills requires a lot of hands-on practice. Practice makes one perfect in whatever skills we set out to improve upon. That is why this article offers resources to help you test your technical skills in ethical hacking …

AutoRecon Tool Review

Recently, I have been studying for the Offensive Security Certified Professional (OSCP) exam and I have been trying to find some new ways to attack the recon and enumeration phase. This is something that has been an ongoing battle throughout my studies. I would run tool after tool and just always feel like my scans …