Home Lab: Wazuh installation
Wazuh This post contains a step by step guide to install a Wazuh server. We will be using Ubuntu desktop to install the server. Prerequisites Follow the below requirements for a smooth uninterup...
Wazuh This post contains a step by step guide to install a Wazuh server. We will be using Ubuntu desktop to install the server. Prerequisites Follow the below requirements for a smooth uninterup...
metasploitable Welcome back to the third installment of our cybersecurity home lab series! In our previous posts we’ve successfully installed our attacker machine and built a dedicated network wit...
dnsmasq Welcome back to the second installment of our cybersecurity home lab series! In our previous post, we established our attacker machine, Kali Linux, and prepared it for action. Now, we’re t...
Kali Linx Introduction Welcome to the first installment of our cybersecurity home lab series! Whether you’re a student, a security enthusiast, or a professional looking to hone your skills, having...
Room Card TL;DR: The HackTheBox machine Code was compromised starting with a web application vulnerability on port 5000, followed by a Python sandbox bypass for environment enumeration. Privilege ...
The Phishing Threat Phishing is the most used tactic in a social-engineering attacks, one of the main reasons being effectiveness. No matter how advanced or how far is cyber security is gone, The m...