OCR updates regularly to include the latest exploit vectors. This week, we are excited to announce the launch of two new vulnerable machines: CVE-2024-2912 and SecuraLyze: https://offs.ec/3xyEegL
OffSec’s Post
More Relevant Posts
-
I've just published a new walkthrough on exploiting the Thales: 1 machine from VulnHub. This guide covers everything from initial reconnaissance to gaining root access, using tools like "netdiscover", "nmap", "Metasploit", and "msfvenom". #CyberSecurity #PenetrationTesting #VulnHub #CTF #EthicalHacking #Infosec
Thales: 1 Vulnhub Walkthrough
link.medium.com
To view or add a comment, sign in
-
MSCSIA/BSCSIA | CISSP/CCSP | C|EH Master/CHFI | BTL1 | PJPT | eJPT/eCDFP/eCTHPv2/eCIR | IWE | CFR | SC900/100/200/300/400 | AZ900/500 | MS900/500 | CASP /PenTest /CySA /Cloud /Linux /Sec /Net /A /Project | ITILv3
This was a well thought out #digital #forensic #investigation from Security Blue Team! The investigation has you #analyze the #disk #image of a #compromised machine, you then have to uncover how the user on the machine got compromised and what the #threat #actor did once they took control of the device using #Autopsy. There is also a bit of #reverseengineering using #PEStudio. The investigation is rated as #Easy, but I would say it's a #Medium. =) https://lnkd.in/e8XtPRsK
Completed UNDRGRND-N3RD! - Blue Team Labs Online
blueteamlabs.online
To view or add a comment, sign in
-
🎉 Excited to share that I’ve just completed an activity and earned a detector badge on LetsDefend! 🚀 In this exercise, I utilized Wireshark to identify and analyze port scanning activity within a network. This hands-on experience enhanced my skills in network security and intrusion detection. Always thrilled to deepen my knowledge and sharpen my tools in cybersecurity! 🔒💻 #CyberSecurity #NetworkSecurity #Wireshark #LetsDefend #ContinuousLearning #PortScanning
Detector
app.letsdefend.io
To view or add a comment, sign in
-
[FREE ACCESS ARTICLE] Digital Forensics Analysis in DeepFake https://lnkd.in/dysbadPz #infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource
Digital Forensics Analysis in DeepFake - eForensics
https://eforensicsmag.com
To view or add a comment, sign in
-
Reduce the workload of manual analyses by 90%. The clarity, speed, and reliability of VMRay’s analyses maximizes the performance of DFIR and CERT teams. https://lnkd.in/eef6MECE
Advanced Threat Analysis Solutions: Why VMRay
https://www.vmray.com
To view or add a comment, sign in
-
Enhancing mission effectiveness through technology-enabled agile construction and facility modernization
Dynamic scanning is an essential component of a comprehensive application security testing strategy, often complementing other security measures. It helps organizations identify and remediate vulnerabilities in their APIs and web applications, reducing the risk of security breaches.
🚀 💻 Dynamic scanning typically refers to the process of actively analyzing and testing a system or application during runtime to identify vulnerabilities, weaknesses, or security issues. This is often done through automated tools or manual testing techniques that simulate real-world attack scenarios. Dynamic scanning is an essential part of the overall security assessment and testing process, particularly for APIs and web applications. 🕷 👇 Take a deep dive with Probely CEO, Nuno Loureiro, as he gives insights to what is dynamic scanning, how it works, and where we are headed in the future. 👇 https://lnkd.in/gnnw7T7f Interview credits 👉 Scott Moore ⚛ 🤝 #CyberSecurity #DAST #DynamicScanning #APIsecurity #WebAppSecurity #Probely #AppSec #AppSecurity
Discover the Power of Dynamic Scanning
https://www.youtube.com/
To view or add a comment, sign in
-
Global Threat Researcher and Cybersecurity Advocate at senhasegura | Snyk Ambassador | Hacking Is Not a Crime Advocate | Speaker | Writer
Logsensor - A Powerful Sensor Tool To Discover Login Panels, And POST Form SQLi Scanning https://lnkd.in/d-vENCpH #cybersecurity #malware #cyber #pentesting #malwareanalysis #infosec #redteam #malwarehunting #hacking #infosec #threathunting #bugbounty #tools #offensivesecurity #cyber #future #computersecurity #cloudsecurity #opensource #infosec #aws #awsattack #offensivesecurity #defensivesecurity #PAM
Logsensor - A Powerful Sensor Tool To Discover Login Panels, And POST Form SQLi Scanning
kitploit.com
To view or add a comment, sign in
-
TOTOLINK A6000R V1.0.1&B20201211.2000 was discovered to contain a command inj...TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function. TOTOLINK, A6000R, V1.0.1-B20201211.2000, was, discovered, contain, command, inj...
TOTOLINK A6000R V1.0.1&B20201211.2000 was discovered to contain a command inj...
cybrmonk.com
To view or add a comment, sign in
-
Global Account Manager - Managed Network & Communications Services - Cybersecurity - MSP Services - IoT Solutions - Managed Cloud Services
[NEW FREE TOOL]: Reveal Your Network's Hidden Weaknesses with KnowBe4's BreachSim Data Exfiltration Simulator https://lnkd.in/eNyEEHq7
[NEW FREE TOOL]: Reveal Your Network's Hidden Weaknesses with KnowBe4's BreachSim Data Exfiltration Simulator
blog.knowbe4.com
To view or add a comment, sign in
-
I'm thrilled to share that I've successfully completed a Sigma room! Diving into the intricacies of Sigma rule syntax has been a fascinating experience, revealing the power of standardized detection rules across different SIEM systems. Throughout this process, I've gained valuable insights into how these rules can be practically applied to detect various types of attacks on machines. From identifying suspicious PowerShell commands to recognizing patterns indicative of privilege escalation attempts, I've seen firsthand how effective Sigma rules can be in enhancing our security posture. 🔐💻 #CyberSecurity #SigmaRules #AchievementUnlocked #LearningJourney #SIEM #ThreatDetection
SigHunt
tryhackme.com
To view or add a comment, sign in
499,305 followers