
How To Set Up Kali Linux Lab on Macbook (FREE)
This blog is for anyone who love hacking and don’t know how to set up a virtual machine lab. We have 2 options: VMware and VirtualBox. Unfortunately, VirtualBox does not support on Macbook, so we...
This blog is for anyone who love hacking and don’t know how to set up a virtual machine lab. We have 2 options: VMware and VirtualBox. Unfortunately, VirtualBox does not support on Macbook, so we...
This blog for anyone who love hacking and don’t know how to gather information and scan vulnerability. Why does it matter? Vulnerability scanning helps you find and fix security weaknesses in ...
CHALLENGE DESCRIPTION We are contacting you with an urgent request concerning a potentially suspicious email that was recently received and unfortunately opened by one of our team members. As a con...
CHALLENGE DESCRIPTION In this Sherlock, you will familiarize yourself with Sysmon logs and various useful EventIDs for identifying and analyzing malicious activities on a Windows system. Palo Alto’...
Machine Information Sightless is an easy-difficulty Linux machine featuring a website for a company offering various services. Enumeration of the website reveals an SQLPad instance vulnerable to t...
Writeup Enumeration nmap -sCV 10.129.117.252 --open PORT STATE SERVICE V...
CHALLENGE DESCRIPTION Last night, most employees’ mobile devices were compromised, putting them at significant risk of leaking personal and private information. We require your expertise in digital...
CHALLENGE DESCRIPTION NeuroSync™ is a leading suite of products focusing on developing cutting edge medical BCI devices, designed by the Korosaki Coorporaton. Recently, an APT group targeted them a...
CHALLENGE DESCRIPTION Our SIEM alerted us to a suspicious logon event which needs to be looked at immediately . The alert details were that the IP Address and the Source Workstation name were a mis...
CHALLENGE DESCRIPTION Talion suspects that the threat actor carried out anti-virtualization checks to avoid detection in sandboxed environments. Your task is to analyze the event logs and identify ...