Posts
This is the list
layout for showing blog posts, which shows just the title and groups them by year of publication. Check out the blog
layout for comparison.
2021
HackTheBox - Devel (Easy)
An easy Windows box from HTB Continue reading HackTheBox - Devel (Easy)
Freshers CTF 2020 by ENUSEC
A comprehensive write-up on the CTF held by ENUSEC at ENU on October 2020 Continue reading Freshers CTF 2020 by ENUSEC
TryHackMe - Gotta Catch'em All! (Beginner)
An easy room with beginner-friendly Crypto challenges. Continue reading TryHackMe - Gotta Catch'em All! (Beginner)
TryHackMe - Crash Course Pentesting (Beginner) - "Final Exam"
A room to give a beginner-friendly approach to some tools used in pentests. Continue reading TryHackMe - Crash Course Pentesting (Beginner) - "Final Exam"
TryHackMe - Year of the Rabbit (Easy)
Hacking into the Year of the Rabbit box without falling down a hole. (Lies). Continue reading TryHackMe - Year of the Rabbit (Easy)
TryHackMe - Overpass (Easy)
What happens when some broke CompSci students make a password manager? Continue reading TryHackMe - Overpass (Easy)
TryHackMe - LazyAdmin (Easy)
Easy Linux machine to practice your skills Continue reading TryHackMe - LazyAdmin (Easy)
TryHackMe - Inclusion (Easy)
A beginner level LFI challenge Continue reading TryHackMe - Inclusion (Easy)
2020
Week 5 Megapost - Implementing security measures to protect corporate data
Hardware security protection, Firewalls, Data breach mitigation and Access Control Lists Continue reading Week 5 Megapost - Implementing security measures to protect corporate data
Backups and data recovery
Read here about different types of backups, data recovery and biometrics Continue reading Backups and data recovery
Firewalls and IDSs
Types of Firewalls and Intrusion Detection Systems Continue reading Firewalls and IDSs
Advantages of having an encrypted email
Encryption, Zero-Access, Data Centers explained and personal thoughts Continue reading Advantages of having an encrypted email
Identity theft. Consequences of medical identity theft and other data breaches
Description of identity theft and its consequences for both individuals and companies Continue reading Identity theft. Consequences of medical identity theft and other data breaches
Top 5 Reasons why Data Breaches Happen
Unpatched vulns, human errors, malware… All covered in here! Continue reading Top 5 Reasons why Data Breaches Happen
TalkTalk (2015 Data Breach)
My views about the amazing Talk-Talk data breach of 2015 Continue reading TalkTalk (2015 Data Breach)