Containers are a virtualization mechanism similar to Virtual Machines (VMs), and container images are based on the Open Container Initiative Distribution Specification. However, when someone talks about “Docker” or “containers”, they often are talking about multiple container technologies that work together. Specifically, the term “Docker” is used to describe: Docker API – a local communication interface on…
Author: Shobhit Mehta
Try Hack Me – Advent of Cyber 3 – Day 17 – ShadowIT & AWS
Shadow IT Sometimes business units go around corporate IT, procurement, legal, and security when they need to get the job done quickly. This leads to security teams not knowing what they need to protect and systems not built to IT or Security standards. Amazon S3 Amazon S3 (Simple Storage Service) is the hosted object storage service….
Try Hack Me – Advent of Cyber 3 – Day 16 – Open Source Intelligence (OSINT)
OSINT & The Digital Footprint OSINT stands for Open Source Intelligence, information that can be obtained from free and public sources. Offensive teams commonly use OSINT to perform reconnaissance on a target, an individual, or a corporation. Agencies and law enforcement can also leverage OSINT to gather information. OSINT is an extensive-term. It is an…
Try Hack Me – Advent of Cyber 3 – Day 15 – Cyber Careers
There were no exercises today, but 4 posts regarding careers in Cybersecurity. Someday I’ll come back and write a post on that. Meanwhile here’s the interview I did with Gyandhan on getting started with Cybersecurity and NEU admission process.
Try Hack Me – Advent of Cyber 3 – Day 14 – CI/CD
What is CI/CD?CI: Continuous Integration is the process in which software source code is kept in a central repository (such as GitHub). All changes are stored in this central repository to avoid ending up with different versions of the same code. CD: Continuous Delivery is the following (sometimes integral) step of the continuous integration model…
Try Hack Me – Advent of Cyber 3 – Day 13 – Privilege Escalation
Privileges A privileged account (such as Administrator on Windows systems or Root on Linux systems) will allow users to access any file on the system and make any changes they need. The best practice is to always allow an account with a lower privilege (aka Least Privilege) and then grant additional access when required. On…
Try Hack Me – Advent of Cyber 3 – Day 12 – NFS
Network File System (NFS) is a protocol that allows the ability to transfer files between different computers and is available on many systems, including MS Windows and Linux. Consequently, NFS makes it easy to share files between various operating systems. We can see the shared files using the command showmount. The -e or –exports show the…
Try Hack Me – Advent of Cyber 3 – Day 11 – Network Analysis & RDBMS
MS SQL Server is a Relational Database Management System (RDBMS). One simple way to think of a relational database is a group of tables that have relations. This was a pretty basic lab. My key learnings were how to use the sqsh command to connect to MS SQL. Syntax – sqsh -S server -U username…
Try Hack Me – Advent of Cyber 3 – Day 10 – Port Analysis using Nmap
IP Addresses Every computer (host) that connects to a network needs to have a logical address. For instance, a host can be any system with network access, such as a laptop, a smartphone, or a Raspberry Pi. We refer to this address as logical because it’s assigned by software and could change over time, for…
Try Hack Me – Advent of Cyber 3 – Day 9 – Packet Analysis using Wireshark
Packet analysis is a technique used to capture and intercept network traffic that passes the computer’s network interfaces. Packet analysis may also be called with different terms such as packet sniffer, packet analyzer, protocol analyzer, or network analyzer. As a cybersecurity individual, gaining packet analysis skills is an important requirement for network troubleshooting and communication…