SANS SEC575 Mobile Device Security and Ethical Hacking: Course Review

https://www.sans.org/cyber-security-courses/mobile-device-security-ethical-hacking/ https://www.giac.org/certifications/mobile-device-security-analyst-gmob/ Late on in 2022, my boss messaged me and asked if I would like to do a SANS course. This one was around mobile security. Having previously done a few mobile tests and done this course on Udemy AND having never done a SANS course before but heard how good they were, how …

HTB Writeups: Teacher

Teacher is my 30th machine on HackTheBox. User access is gained through finding partial credentials, fuzzing the password and then exploiting a hole in the Moodle software to leverage code execution and get a reverse shell. This initial access is then escalated from www-data to a userful user account using SQL database credentials found in …

HTB Writeups: Access

Access is the 29th machine I attempted on HackTheBox. User Access is gained through reading a MS Access database to get the password to a zipped file. Root access is gained by exploiting stored credentials. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub …

HTB Writeups: Active

Active, the 28th machine I attempted on HackTheBox, is a relatively easy box but with some bits that you can learn if you don't know much about exploiting Active Directory and Kerberos. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub and shared in …

Design a site like this with WordPress.com
Get started