WRITEUPS

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Shocker. The difficult part of this box is crafting the SQL Injection correctly. While using burp to deliver this command...
video
The next endpoint in our HTB writeup series is Popcorn, a medium box that is retired but also very OSCP-like. After running our nmap scans we find that the endpoint is vulnerable to CVE-2010-0832 a vulnerability in the linux authentication system (PAM) USN-959-1. When...
video
https://www.youtube.com/watch?v=9LHjuWCgMvs iShare Studio Tour (gear I use to make videos) Stuff in my studio: PODCAST SETSony a6400$1,298.00Mac Laptop$1,111.00Atomos Ninja V Atomos Ninja V.$634.94Blackmagic Design ATEM Mini HDMI Live Switcher$295.00Zoom H6$329.00Rode PodMic Cardioid Dynamic Podcasting Microphone$99.00VIVO Dual...
video
https://youtu.be/BhnHJo7tG6g HTB Intro - Welcome back Youtube, In today's video we discussing HTB which has become my chosen playground for pwn training. This video will cover the tips & techniques you will need to exploit an endpoint. I...
Upgrading your treat hunting skills to next generation capabilities. When defending against the next generation of malicious targeting against your network and systems, we as threat hunters have to employ security strategies that are driven by personalized cyber defense context. This hunt style is based on what each user typically...
iam @JamelEliYah the Managing Director