Detection Techniques
Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.
Detailed guides, technical deep-dives, and documentation for my projects.
Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.
Learn about active recon, web app attacks and privilege escalation.