People develop malware for a variety of reasons, and their motivations can range from malicious intent to more benign or even ethical reasons. #malwareanalysis #informationsecurity#reverseengineering
The Vulnerability Reporting is crucial in conveying information and insights in today's fast-paced world. It communicates between organizational stakeholders, providing a comprehensive overview of various activities and performance metrics. Let's talk about them.
This is second post in the Vulnerability Management, a practical approach series. Buckle up and let's tackle one parameter at a time, appreciating the sheer importance of each in our quest for a foolproof strategy.
Identifying assets for scanning is the very first and most important step. The program's success depends on how well the organisation has inventoried its assets.We will discuss the must-to-have fields and some good-to-have fields for a CMDB tool.
So, whether you're a beginner seeking a comprehensive understanding of Vulnerability Management or an experienced professional looking to enhance your existing program, I invite you to join me on this journey. Together, we will navigate the intricate world of Vulnerability Management, acquiring the tools and knowledge needed to create a robust and resilient program. Post #1 of this series. #vulnerabilityManagement #vm #vulnerabilityassessment
Early in 2022 after completing training and GPEN certification, started self-learning for binary analysis. Later in 2022, I was able to get a sponsored training and certification voucher from the company. I opted for the OnDemand package which allows me to watch video tutorials and do hands-on exercises as per my schedule. The course hard... Continue Reading →
This is the 4th machine in Hack the Box[HTB] series. This machine has retired from the Active machines' list and falls in the category of Easy machines. The aim of this box is going to be the same as other HTB machines i.e. find user and root[system] flag. The target IP is 10.10.10.152 and the... Continue Reading →
Another room from TryHackMe focusing on exploiting an RCE and Default configuration. The room is rated as Easy on the platform. The room can be accessed here. As per the room description, we have a newly deployed Web Server and there seems to be issues with the web server configuration. We are supposed to find... Continue Reading →
To maintain the streak of continuous presence on TryHackMe, I tried my hands on another easy level machine. I am trying to cover easy machines and have the write up updated before scaling to medium difficulty. I selected Kenobi which is described as this room will cover accessing a Samba share, manipulating a vulnerable version... Continue Reading →