Expressway- Hackthebox lab
I began this lab by running Nmap to identify open TCP and UDP ports on the target system. During the scan, I noticed that UDP port 500 was open, which immediately suggested the presence of Read more
The latest cyber news and a weekly security tip in a short email message.
Short remote training over Zoom to review the top 5 personal online security controls.
OSINT shield discovers your personal information online and helps you submit takedown requests.

We believe privacy is a fundamental right and a responsibility we uphold in how we think, work, and build.

We believe learning should be continuous and shared, because informed people make stronger decisions.

We believe in showing up for others with consistency, respect, and follow-through—especially when it matters most.
Founded in 2019, The Cyber Staff, LLC provides local cybersecurity services and practical security guidance, pairing hands-on help with “bite-sized” training. The company also publishes The Cyber Short, a weekly newsletter featuring top security stories and actionable defense tips to help audiences stay ahead of emerging threats.

I began this lab by running Nmap to identify open TCP and UDP ports on the target system. During the scan, I noticed that UDP port 500 was open, which immediately suggested the presence of Read more
This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked. Next I ran Bloodhound-ce-python to collect Active Directory data for Read more
I started with an nmap scan for all TCP ports and the top UDP ports. This one looks like an Active Directory Domain Controller. Added target hostnames to /etc/hosts Looking through the SMB shares, I Read more
This box took a ton of troubleshooting and resets for the privilege escalation. The web server kept crashing but after many attempts, I finally got it finished. I start things off with a port scan Read more
To begin my enumeration, I performed a port scan of both TCP and UDP ports using Nmap. This initial step allowed me to establish a clear picture of the services that were exposed and set Read more
I began the engagement by performing a full TCP and UDP port scan with Nmap to identify open services running on the target. A SYN scan was used on all TCP ports for speed and stealth, while Read more