Active Directory Enumeration & Attacks
(Insights from HTB Academy)Part 1: LLMNR/NBT-NS PoisoningSecuring Active Directory (AD) is crucial for safeguarding a network's identity management system, which...
Vulnerability Management with OpenVAS
According to ISO 27001 vulnerability management is the process of identifying and mitigating vulnerabilities within the organization’s information systems in...
Footprinting Microsoft SQL
(Insights from HTB Academy)Microsoft SQL (MSSQL) is Microsoft's SQL-based relational database system, widely used on Windows, especially with .NET applications.Security...
Footprinting – SMTP / IMAP / POP3
(Insights from HTB Academy) SMTP (Simple Mail Transfer Protocol) remains a key protocol for sending emails and continues to be widely...
Footprinting -DNS
(Insights from HTB Academy)DNS Functionality: Key thing is to understand how DNS works . DNS translates computer names into IP...
Security Lab Using EVE-NG (Part 1)
1. Install VMware Workstation PlayerDownload and install the latest version of VMware Workstation Player from the official website then create...
Introduction to Digital Forensics
Part 1 - IntroductionInterpol defines digital forensics as a branch of forensic science focused on identifying, acquiring, processing, analyzing, and...
Introduction to Threat Hunting
First, let us establish the concept and meaning of IOC . An Indicator of Compromise(IOC) is a data point used...
Introduction to OSINT
Open-source intelligence (OSINT) is more than just Googling information. While a quick search may provide basic answers, it often lacks...
Network Analysis
Wireshark is an open-source network packet analyzer that allows you to see all the network traffic being transmitted (sent/received) over...