CTI – Part 4

Ok everyone, I hope you have enjoyed this series thus far. We have been moving right through some Cyber Threat Intelligence (CTI) concepts and we have covered a lot of ground thus far. Now I think it is important to talk about one of the main components of CTI – Tactics, Techniques, and Procedures (TTP) …

Walking an Application – THM Walkthrough

Introduction This report documents the findings of an engagement on Walking An Application room on the TryHackMe platform. The testing engagement was performed against an Ubuntu machine running an Nginx webserver. The machine provided by TryHackMe had a web application found on https://10-10-153-155.p.thmlabs.com/ which served as the main focus of the engagement. The purpose of …

CTI Cycle

It is hard to talk about any type of intelligence without mentioning the intelligence cycle. It is a method for delivering actionable intelligence to customers through a flexible stepwise process. Even though it is usually depicted as a cycle that moves in one circular motion, in reality it does not run so smoothly. At any …