WRITEUPS

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Shocker. The difficult part of this box is crafting the SQL Injection correctly. While using burp to deliver this command...
video
The next endpoint in our HTB writeup series is Popcorn, a medium box that is retired but also very OSCP-like. After running our nmap scans we find that the endpoint is vulnerable to CVE-2010-0832 a vulnerability in the linux authentication system (PAM) USN-959-1. When...
video
https://www.youtube.com/watch?v=9LHjuWCgMvs Dive into the Den: Jamel's Setup Tour of Our Podcast & YouTube Channel Ever wondered what goes on behind the scenes of our podcast and YouTube channel? Well, wonder no more! Jamel, our resident tech guru, recently took...
video
https://youtu.be/BhnHJo7tG6g HTB Intro - Welcome back Youtube, In today's video we discussing HTB which has become my chosen playground for pwn training. This video will cover the tips & techniques you will need to exploit an endpoint. I...
Upgrading your treat hunting skills to next generation capabilities. When defending against the next generation of malicious targeting against your network and systems, we as threat hunters have to employ security strategies that are driven by personalized cyber defense context. This hunt style is based on what each user typically...
iam @JamelEliYah the Managing Director @ iShareHow Labs LLC