The document discusses the critical role of threat intelligence in cybersecurity, emphasizing its importance in understanding and mitigating cyber threats. It defines threat intelligence as evidence-based...
Day: September 22, 2024
Exploiting Client-Side Path Traversal
CSRF is dead, long live CSRF To provide users with a safer browsing experience, the IETF proposal named “Incrementally Better Cookies” set in motion a few...
Hardware Security Module(HSM) as a Service
The document discusses the allocation of tasks and responsibilities between Hardware Security Module as a Service (HSMaaS) providers and consumers, focusing on physical and logical security...
CREDENTIAL DUMPING FAKE SERVICES
The document titled “Credential Dumping, Fake Service” provides an extensive overview of various credential capturing techniques by setting up fake services using Metasploit. It focuses on...
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
The document titled “Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform” by Azhar Ghafoor details the steps to set up a threat hunting...
A Detailed Guide on Covenant
Covenant is a.NET Command and Control Framework that was created to target and invade the .NET surface and provide the ability to go offensive. It provides...
CIS Critical Security Controls
The CIS Critical Security Controls® (CIS Controls®) started as a simple grassroots activity to identify the most common and important real-world cyber attacks that affect enterprises...
Computer Security Incident Handling Guide
Recommendations of the National Institute of Standards and Technology Computer security incident response has become an important component of information technology (IT) programs. Because performing incident...
COMPREHENSIVE GUIDE ON SSH TUNNELING
Basically, tunnelling is a process that allows data sharing or communication between two different networks privately. Tunneling is normally performed by encapsulating the private network data...
DIGITAL FORENSIC FTK IMAGER
FTK Imager is an open-source software by AccessData that is used for creating accurate copies of the original evidence without actually making any changes to it....









