Try Hack Me – Advent of Cyber 3 – Day 18 – Containers

Containers are a virtualization mechanism similar to Virtual Machines (VMs), and container images are based on the Open Container Initiative Distribution Specification. However, when someone talks about “Docker” or “containers”, they often are talking about multiple container technologies that work together. Specifically, the term “Docker” is used to describe: Docker API – a local communication interface on…

Try Hack Me – Advent of Cyber 3 – Day 17 – ShadowIT & AWS

Shadow IT Sometimes business units go around corporate IT, procurement, legal, and security when they need to get the job done quickly. This leads to security teams not knowing what they need to protect and systems not built to IT or Security standards.  Amazon S3 Amazon S3 (Simple Storage Service) is the hosted object storage service….

Try Hack Me – Advent of Cyber 3 – Day 16 – Open Source Intelligence (OSINT)

OSINT & The Digital Footprint OSINT stands for Open Source Intelligence, information that can be obtained from free and public sources. Offensive teams commonly use OSINT to perform reconnaissance on a target, an individual, or a corporation. Agencies and law enforcement can also leverage OSINT to gather information. OSINT is an extensive-term. It is an…

Try Hack Me – Advent of Cyber 3 – Day 14 – CI/CD

What is CI/CD?CI: Continuous Integration is the process in which software source code is kept in a central repository (such as GitHub). All changes are stored in this central repository to avoid ending up with different versions of the same code. CD: Continuous Delivery is the following (sometimes integral) step of the continuous integration model…

Try Hack Me – Advent of Cyber 3 – Day 12 – NFS

Network File System (NFS) is a protocol that allows the ability to transfer files between different computers and is available on many systems, including MS Windows and Linux. Consequently, NFS makes it easy to share files between various operating systems. We can see the shared files using the command showmount. The -e or –exports show the…

Try Hack Me – Advent of Cyber 3 – Day 9 – Packet Analysis using Wireshark

Packet analysis is a technique used to capture and intercept network traffic that passes the computer’s network interfaces. Packet analysis may also be called with different terms such as packet sniffer, packet analyzer, protocol analyzer, or network analyzer. As a cybersecurity individual, gaining packet analysis skills is an important requirement for network troubleshooting and communication…