cyberethical_me's profile picture. 👤 Asentinn
🔥 #EthicalHacking and #Cybersecurity related content.
🔥 #Writeups for #CTF and #hacking boxes.
👉 LinkedIn, Instagram
📌 #CyberEthical

CyberEthical.Me @[email protected]

@cyberethical_me

👤 Asentinn 🔥 #EthicalHacking and #Cybersecurity related content. 🔥 #Writeups for #CTF and #hacking boxes. 👉 LinkedIn, Instagram 📌 #CyberEthical

Hey, did any of you had the same issue when trying to get the exam voucher from EC-Council? I've finished my scholarship month ago, created a ticket on their support page, and they keep ignoring/deferring my issue. #eccouncil #ecc #exam


✴ Quick update, there will be most certainly a delay in Sherlocks' #writeups publishing as because of following the rule "from most to least solves" my stupid ass started solving the active ones (four in backlog) for which I am not allowed to publish writeups yet 😅

cyberethical_me's tweet image. ✴ Quick update, there will be most certainly a delay in Sherlocks' #writeups publishing as because of following the rule "from most to least solves" my stupid ass started solving the active ones (four in backlog) for which I am not allowed to publish writeups yet 😅

CyberEthical.Me @[email protected] reposted

The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.


I just pwned Tracer in Hack The Box! Definitely the hardest of easiest ones so far :P labs.hackthebox.com/achievement/sh… #hackthebox #htb #cybersecurity


And my Sherlock's #writeups released each Friday at 8am UTC will supplement that! Meerkat already out, Bumblebee follows on 29th! blog.cyberethical.me/series/htb-she…

Wanna git gud? 😎 Here's our pick for the top 5 Sherlocks that will help you improve your DFIR skills (quickly) as a #cybersecurity beginner! Read the full breakdown on our #blog: okt.to/Ja29jt #HackTheBox #HTB #InformationSecurity #DFIR #DefensiveSecurity

hackthebox_eu's tweet image. Wanna git gud? 😎
Here's our pick for the top 5 Sherlocks that will help you improve your DFIR skills (quickly) as a #cybersecurity beginner! Read the full breakdown on our #blog: okt.to/Ja29jt

#HackTheBox #HTB #InformationSecurity #DFIR #DefensiveSecurity


Windows #Prefetch. Windows caches pieces of apps information over an executable after it is run to speed up the future application load time. Using one of Eric #Zimmerman's Tools you can see many more details than you think of. How is this application called? #forensics

cyberethical_me's tweet image. Windows #Prefetch.
Windows caches pieces of apps information over an executable after it is run to speed up the future application load time. Using one of Eric #Zimmerman's Tools you can see many more details than you think of.

How is this application called?

#forensics
cyberethical_me's tweet image. Windows #Prefetch.
Windows caches pieces of apps information over an executable after it is run to speed up the future application load time. Using one of Eric #Zimmerman's Tools you can see many more details than you think of.

How is this application called?

#forensics

CyberEthical.Me @[email protected] reposted

What's cooking? 🧑‍🍳 A skilled chef always comes prepared! Let us walk you through the recipe for the perfect incident report so that you are always ready to take action. Find the full guide to drafting an incident report: okt.to/w24U0m #HackTheBox #HTB #DFIR

hackthebox_eu's tweet image. What's cooking? 🧑‍🍳 
A skilled chef always comes prepared! Let us walk you through the recipe for the perfect incident report so that you are always ready to take action. Find the full guide to drafting an incident report: okt.to/w24U0m
#HackTheBox #HTB #DFIR

Break-glass access is granted through a dedicated break-glass account which is usually created in advance. The account is typically highly privileged and allows access to the most critical systems bypassing usual access controls. ssh.com/academy/secret… #CyberEthical #ITSec


👏 Congratulations to Adham Elmosalamy for clearing the Insane class Web challenge from last @hackthebox_eu #CTF and preparing winning #write-up! Take a moment and check it out 😊 blog.elmosalamy.com/posts/apexsurv…


Starting a new series of write-ups! Sherlocks are investigative challenges that test defensive #security skills. I encourage you to try them out if you like #digitalforensics, #incidentresponse, post-breach analysis and #malwareanalysis! blog.cyberethical.me/htb-sherlock-m… #CyberEthical

cyberethical_me's tweet image. Starting a new series of write-ups!
Sherlocks are investigative challenges that test defensive #security skills. I encourage you to try them out if you like #digitalforensics, #incidentresponse, post-breach analysis and #malwareanalysis! 

blog.cyberethical.me/htb-sherlock-m…

#CyberEthical

🎉 Finally, it's here - the most humble experience in weeks dissected for my readers - enjoy! 🙇‍♂️ @_c4n0pus for challenge! 🙇‍♂️ @hackthebox_eu for organizing #CTF of that scale and quality! 🔗 blog.cyberethical.me/htb-cyber-apoc… #CyberEthical #forensics #malwareanalysis #reverseengineering


I just completed "Scratchcards" - Day 4 - Advent of Code 2023 adventofcode.com/2023/day/4 #AdventOfCode


Loading...

Something went wrong.


Something went wrong.