1. Cybrary
2.TryHackMe
3. OverTheWire
4. HackTheBox
5. LetsDefend
6. PicoCTF
1. Cybrary
2.TryHackMe
3. OverTheWire
4. HackTheBox
5. LetsDefend
6. PicoCTF
so now i end the year ready for cc & sec+ & w/ htb cjca @ 100%, cdsa @ 56%, cpts @ 26%
so now i end the year ready for cc & sec+ & w/ htb cjca @ 100%, cdsa @ 56%, cpts @ 26%
#programming #hackthebox #information-technology #hacking #cybersecurity
Origin | Interest | Match
#programming #hackthebox #information-technology #hacking #cybersecurity
Origin | Interest | Match
This one was really enjoyable — the user part caught me off guard with how quick and unexpected it was 👀, but the root part totally made up for it — solid challenge, clever logic, and super satisfying to solve
This one was really enjoyable — the user part caught me off guard with how quick and unexpected it was 👀, but the root part totally made up for it — solid challenge, clever logic, and super satisfying to solve
This one was really enjoyable — the user part caught me off guard with how quick and unexpected it was 👀, but the root part totally made up for it — solid challenge, clever logic, and super satisfying to solve.
This one was really enjoyable — the user part caught me off guard with how quick and unexpected it was 👀, but the root part totally made up for it — solid challenge, clever logic, and super satisfying to solve.
Introduction: In the competitive world of cybersecurity, theoretical knowledge is insufficient; practical, hands-on experience is the true differentiator. Platforms like HackTheBox (HTB) provide a…
Introduction: In the competitive world of cybersecurity, theoretical knowledge is insufficient; practical, hands-on experience is the true differentiator. Platforms like HackTheBox (HTB) provide a…
#programming #hackthebox #information-technology #hacking #cybersecurity
Origin | Interest | Match
#programming #hackthebox #information-technology #hacking #cybersecurity
Origin | Interest | Match
#cybersecurity #hackthebox #security #information-security #hacking
Origin | Interest | Match
#cybersecurity #hackthebox #security #information-security #hacking
Origin | Interest | Match
Introduction: The traditional method of learning penetration testing through HackTheBox writeups is being transformed by artificial intelligence. Cybersecurity professionals are now using AI tutors to deeply understand…
Introduction: The traditional method of learning penetration testing through HackTheBox writeups is being transformed by artificial intelligence. Cybersecurity professionals are now using AI tutors to deeply understand…
A bit of context: For every #hackthebox lab, #ctf, or other competition that I do, it's often convenient to add entries to the hosts file.
A bit of context: For every #hackthebox lab, #ctf, or other competition that I do, it's often convenient to add entries to the hosts file.
You have no excuse.
· TryHackMe / HackTheBox
· Professor Messer (YouTube)
· Microsoft Learn
The resources are free. The discipline to use them isn't.
You have no excuse.
· TryHackMe / HackTheBox
· Professor Messer (YouTube)
· Microsoft Learn
The resources are free. The discipline to use them isn't.
Introduction: The HackTheBox machine "Voleur" represents a sophisticated assumed-breach Active Directory scenario that tests multiple advanced attack vectors. This complex engagement demonstrates how attackers can chain…
Introduction: The HackTheBox machine "Voleur" represents a sophisticated assumed-breach Active Directory scenario that tests multiple advanced attack vectors. This complex engagement demonstrates how attackers can chain…
Introduction: The compromise of an Active Directory domain remains a primary objective for cyber adversaries, and the HackTheBox "Voleur" machine provides a masterclass in chaining together common…
Introduction: The compromise of an Active Directory domain remains a primary objective for cyber adversaries, and the HackTheBox "Voleur" machine provides a masterclass in chaining together common…