Starting in Incident Response and Network Security
A resource guide to those starting out in Incident Response and Network Forensics
Upcoming Blog List
Includes the list of upcoming blogs I am working on, or which are currently in draft.
Rootwe realist writeup
This post entails about the walkthrough of cracking the machine on rootme.org in the realist seciton called root-we and is a web based challenge
Secret and Lies, Book Review
This was one of the first books I read when I started out to learn more about information security few months back, and hands down it played a great role in piquing my interest in information security. I had read Bruce's earlier work , and read his blogs which is updated regularly on issues around information security.
ARP Spoofing and MITM
ARP or Address resolution protocol is a protocol that maps layer 2 addresses or physical addresses to the layer 3 IP addresses. Routing and Ip-forwarding are done at layer 3 but the packets actually are sent/received/dropped as per MAC addresses, hence any packet needs to know the IPaddress to MAC mapping before sending it.
MrRobot Vulnhub writeup
This post entails about the walkthrough of getting root on a VM MrRobot which is present on VulnHub. This machine is at a beginner level, and one of the first machines that I broke on VulnHub. You are strongly recommended to try everything on your own before proceeding.
DLL Hijacking
Dynamic Linked Lists. Simply put, dynamic linked libraries are external libraries which are needed by a program during run time. There are different kinds of DLL's and are treated differently by the operating system as such. The APP_INIT DLL's are known trusted DLL's which are loaded from the registry before
Bandit Overthewire solution writeups
These are the easiest problems of the wargame prepping us for the reverse engineering and tougher challenges that lie ahead. We have a series of 34 machines to ssh into, and each machine holds the password to the next machine. It is highly recommended to solve the challenges on your own before proceeding to look for the solution. The solutions p...
16 post articles, 2 pages.