Igor_sec's Blog
Hello! Welcome to my blog where I post write-ups for CTF challenges.
Hello! Welcome to my blog where I post write-ups for CTF challenges.
Scenario 1 (APT): The focus of this hands on lab will be an APT scenario and a ransomware scenario. You assume the persona of Alice Bluebird, the soc analyst who has recently been hired to protect and defend Wayne Enterprises against various forms of cyberattack. In this scenario, reports of the below graphic come in…
Introduction: In this machine, I will try to exploit a vulnerable windows machine. It involves some of the basic penetration phases such as information gathering, threat modelling or vulnerability identification, exploitation, and post-exploitation. This room will also illustrate two methods of gaining access and escalating privileges. Information Gathering: I started with enumerating the services , OS…
My first ever blog on becoming a Cyber Security Professional. I am on a learning journey and would appreciate positive feedback. This is a machine for practicing web app hacking and privilege escalation. It is included as part of the Complete Beginner Path. First thing to do is to start and connect to the machine,…