Buff- Hackthebox lab
I began the assessment by performing an Nmap port scan to identify open services on the target machine. The scan revealed that port 8080 was open, hosting a web service with the intriguing HTTP title: Read more
The latest cyber news and a weekly security tip in a short email message.
Short remote training over Zoom to review the top 5 personal online security controls.
OSINT shield discovers your personal information online and helps you submit takedown requests.

We believe privacy is a fundamental right and a responsibility we uphold in how we think, work, and build.

We believe learning should be continuous and shared, because informed people make stronger decisions.

We believe in showing up for others with consistency, respect, and follow-through; especially when it matters most.
Founded in 2019, The Cyber Staff, LLC provides local cybersecurity services and practical security guidance, pairing hands-on help with “bite-sized” training. The company also publishes The Cyber Short, a weekly newsletter featuring top security stories and actionable defense tips to help audiences stay ahead of emerging threats.

I began the assessment by performing an Nmap port scan to identify open services on the target machine. The scan revealed that port 8080 was open, hosting a web service with the intriguing HTTP title: Read more
I began with an Nmap scan to identify open TCP ports, detect service versions, and run the default NSE scripts. The scan revealed two open ports: 22 (SSH) and 80 (HTTP). Port 80 was hosting Read more
I began the lab by running an Nmap scan to identify open TCP and UDP ports. Based on the results, I chose to focus first on TCP ports 80 (HTTP) and 443 (HTTPS), as these Read more
This machine has a webs server that has unauthenticated access with an IDOR (Insecure Direct Object Reference) vulnerability. By changing the number at the end of the URL, you can find a PCAP file with Read more
I began this lab by running Nmap to identify open TCP and UDP ports on the target system. During the scan, I noticed that UDP port 500 was open, which immediately suggested the presence of Read more
This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked. Next I ran Bloodhound-ce-python to collect Active Directory data for Read more