Synced – Hack The Box // Walkthrough & Solution // Kali Linux

Synced – Hack The Box // Walkthrough & Solution // Kali Linux Today I’m coming back to squash the Starting Point, Tier 0, with Synced! Starting Point is for learning the basics of pen-testing and cyber security using Kali Linux. And what better way to do it than by discovering…


0 Comments1 Minutes

Mongod – Hack The Box // Walkthrough & Solution // Kali Linux

Mongod – Hack The Box // Walkthrough & Solution // Kali Linux Using Kali Linux, HTB’s Mongod box was a tricky one! Hack the Box throws a curve ball by adding the Mongo switch pretty() at the end of the submission string. Since I’m not a Mongo expert, it took me a while…


0 Comments1 Minute

Preignition – Hack The Box // Walkthrough & Solution // Kali Linux

Preignition – Hack The Box // Walkthrough & Solution // Kali Linux Using Kali Linux, Preignition from the Hack the Box (HTB) Starting Point series is all about dirbusting a web address on port 80/tcp (HTTP) to find a hidden admin page. This box is part of Tier 0 and catalogued as…


0 Comments1 Minute

Explosion – Hack The Box // Walkthrough & Solution // Kali Linux

Explosion – Hack The Box // Walkthrough & Solution // Kali Linux Today, using Kali Linux, we’ll continue our Hack the Box (HTB) Marathon series with box number #5, “Explosion.” This challenge is considered “very easy” and it’s part of the Stating…


0 Comments1 Minute

Redeemer – Hack The Box // Walkthrough & Solution // Kali Linux

Redeemer – Hack The Box // Walkthrough & Solution // Kali Linux Hello Everyone!!! Using Kali Linux, I’ll explain how to solve the “Redeemer” machine, which is part of the “Starting Point” labs and has a “Very Easy” difficulty rating. The…


0 Comments1 Minute

Dancing – Hack The Box // Walkthrough & Solution // Kali Linux

Dancing – Hack The Box // Walkthrough & Solution // Kali Linux Hello, and welcome back to this Hack The Box Marathon, where we pwd boxes in the HTB Starting Point Tiers, using Kali Linux. In this video, we examine SMB (Server Message Block) functionality. How the…


0 Comments1 Minutes

Fawn – Hack The Box // Walkthrough & Solution // Kali Linux

Fawn – Hack The Box // Walkthrough & Solution // Kali Linux This tutorial reviews Hack The Box’s second box, FAWN, using Kali Linux. I go through the complete procedure step-by-step, from logging in to starting the box, doing each activity, and submitting the flag at the…


0 Comments1 Minutes

The Rise of Insider Threats

The Rise of Insider Threats: A New Reality for Cybersecurity

According to a Gurucul study, insider threats are the top concern for all types of organizations, with only 3% of survey respondents saying they are not concerned about insider risk. With answers from over 325 cybersecurity professionals, the report looks at the latest trends and challenges…


0 Comments6 Minutes

TikTok National Security Concerns

TikTok’s Proposes to Address US National Security Concerns

TikTok has offered a comprehensive plan to a secretive government panel that will determine its future in the United States. However, it depends heavily on the American tech giant Oracle to minimize the popular video app’s alleged security dangers. An anonymous TikTok executive revealed to…


0 Comments7 Minutes

Exchange Servers

Fix Your On-Premises Exchange Servers Urgently – Microsoft Recommends

Microsoft “strongly” advises users to maintain their Exchange servers up to date and take precautions such as enabling Windows Extended Protection and configuring the certificate-based signing of PowerShell serialization payloads. The software giant’s Exchange team says attackers…


0 Comments5 Minutes