Blog

Optimum – HackTheBox Walkthrough

Optimum – HackTheBox Walkthrough

Optimum is a beginner-level machine that is more of enumeration of services with known exploits. These exploits are easy to work out and get the flag. We will be having two parts in this blog. This is the first part Tools Used: • Nmap• Metasploit• Windows Exploit Suggester $ sudo nmap -sSV -T5 -p- 10.10.10.8

Read More
Managing Vulnerabilities

Managing Vulnerabilities

Managing your hidden security gaps and beyond

Read More
CISA’s Top 30 Bugs from oldest to recent : Get patch immediately

CISA’s Top 30 Bugs from oldest to recent : Get patch immediately

Government agencies in the US, UK, and Australia are encouraging public and private-sector organizations to secure their networks by ensuring firewalls, VPNs, and other internally connected devices are patched against the most widespread cyber threats. Globally, cyber criminals continue to target a wide range of targets, including public and private sector organizations, by exploiting publicly

Read More
NIST Recommendations for Computer Security Incident Handling

NIST Recommendations for Computer Security Incident Handling

Computer security incident response is a very important component of information technology programs. Because performing incident response effectively is a complex and time-consuming task, establishing a successful incident response capability requires substantial planning and resources. The NIST Computer Security Incident Handling Guide provides in-depth guidelines on how to build an incident response capability within an

Read More