At the heart of Smol is a WordPress website, a common target due to its extensive plugin ecosystem....
Nmap Scan We started off with an nmap scan As we can observe, we see 2 ports are...
1. What is Brim? What is Brim? Brim is an open-source desktop application that...
1. Anomalous DNS An alert triggered: "Anomalous DNS Activity". The case was assigned to...
1. Introduction to Network Monitoring Approaches Network monitoring is a set of management...
Introduction to Network Forensics Network Forensics is a specific subdomain of the...
Scenario 1: Brute Force First of all, start Snort in sniffer mode and try to figure out...
1. Writing IDS Rules (HTTP) Flag 1 Navigate to the task folder and use the...
1. Snort Before diving into Snort and analysing traffic, let's have a brief overview of...
Network Security The essential concern of Network Security focuses on two core concepts:...
1. Introduction What is MISP? MISP (Malware Information Sharing Platform) is an...
OpenCTI OpenCTI is another open-sourced platform designed to provide organisations with...
Upon examining source IP of 144[.]172[.]79[.]92, we see that it is flagged as malicious. As the...
🛡️ Security Incident Report: CVE-2024-24919 Exploitation Attempt Date: June 6, 2024 Time: 03:12...
Incident Case Report Case Title: CVE-2024-49138 Exploitation via svohost.exe and Remote...
What is Yara? All about Yara "The pattern matching swiss knife for malware researchers...
Threat Intelligence Threat Intelligence Classifications: Threat Intel is geared...
This Google Drive link contains all the writeups I could compile from solving various CTF challenges....
HTTP/2 uses a binary format and clearly defines boundaries for elements in...
Headers Involved Emphasis on headers: Content-Length that states the number of...
Same Origin Policy (SOP) Policy that instructs how web browsers interact between web...
Which sinks can lead to DOM-XSS vulnerabilities? The following are some of the main sinks...
JavaScript for XSS In web browser, go Inspect Element, then go to Console. Let’s review...
In JS, Prototype functions similarly to Classes Difference Between Class and Prototype in...
Real World Analogy Example A Let’s consider this scenario: A bank account has...
Types Relative vs Absolute Pathing Relative Pathing: Locates files based...
What is SSRF When developing networked software, it's common to make requests to external...
Serialisation Serialisation is just like taking different pieces of information (like...
What is ORM? Object-relational Mapping (ORM) is a programming technique that facilitates...
Understanding LDAP and its Role in Directory Services LDAP (Lightweight Directory Access...