
Basic SIEM Home Lab Using Elastic Cloud
Create an Elastic Account.Visit https://www.elastic.co and sign up for a free account using your email.2. Open the Elastic Cloud console...

Basics of Pivoting
In this post, we’ll walk through how to pivot from a compromised Metasploitable VM into a private network and use...

Security Lab Using EVE-NG (Part 1)
1. Install VMware Workstation PlayerDownload and install the latest version of VMware Workstation Player from the official website then create...

Introduction to Digital Forensics
Part 1 - IntroductionInterpol defines digital forensics as a branch of forensic science focused on identifying, acquiring, processing, analyzing, and...

Introduction to Threat Hunting
First, let us establish the concept and meaning of IOC . An Indicator of Compromise(IOC) is a data point used...

Introduction to OSINT
Open-source intelligence (OSINT) is more than just Googling information. While a quick search may provide basic answers, it often lacks...

Network Analysis
Wireshark is an open-source network packet analyzer that allows you to see all the network traffic being transmitted (sent/received) over...

Building Your Own Pentest Box: Part 3 – Ethical Hacking (Exploitation with Metasploit )
Important Disclaimer: Using these modules for anything other than testing on a system you have permission to exploit is illegal...

Building Your Own Pentest Box: Part 2 – Setting Up Kali Linux
2. Once completed, log in to the VM using the credentials below: Username: vagrant Password: vagrant 3. Check network settings...

Building Your Own Pentest Box: Part 1 – Setting Up Metasploitable 3
Background: Metasploitable3 is a virtual machine (VM) purposefully designed with numerous security vulnerabilities. It serves as a target for testing...