SANS SEC575 Mobile Device Security and Ethical Hacking: Course Review

https://www.sans.org/cyber-security-courses/mobile-device-security-ethical-hacking/ https://www.giac.org/certifications/mobile-device-security-analyst-gmob/ Late on in 2022, my boss messaged me and asked if I would like to do a SANS course. This one was around mobile security. Having previously done a few mobile tests and done this course on Udemy AND having never done a SANS course before but heard how good they were, how …

Zero-Point Security Red Team Ops: Course Review

https://training.zeropointsecurity.co.uk/courses/red-team-ops Having passed Nikhil Mittal's great CRTP course in October 2022, I wanted something similar to sink my teeth into at the beginning of 2023. A colleague of mine had been working his way through the Zero-Point Security Red Team Ops lab and it sounded great, so I purchased it and started on my way. …

Android App Hacking – Black Belt Edition: Course Review

https://www.udemy.com/course/android-app-hacking-black-belt-edition/ I was recommended this course by a colleague when I said I wanted to learn more about Android hacking, so I could feel confident auditing Android apps for clients. At full price it's £109 and, let me tell you, even if you can't get this on a deal it is more than worth it. …

HTB Writeups: Teacher

Teacher is my 30th machine on HackTheBox. User access is gained through finding partial credentials, fuzzing the password and then exploiting a hole in the Moodle software to leverage code execution and get a reverse shell. This initial access is then escalated from www-data to a userful user account using SQL database credentials found in …

HTB Writeups: Access

Access is the 29th machine I attempted on HackTheBox. User Access is gained through reading a MS Access database to get the password to a zipped file. Root access is gained by exploiting stored credentials. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub …

HTB Writeups: Active

Active, the 28th machine I attempted on HackTheBox, is a relatively easy box but with some bits that you can learn if you don't know much about exploiting Active Directory and Kerberos. User Access I started, as I always do, with the nmapautomator script that the wonderful 21yfd made available on GitHub and shared in …

Design a site like this with WordPress.com
Get started