OSINT Rethinking Anonymity: Why Privacy Browsers Fall Short Blocking trackers or using privacy browsers no longer guarantees true anonymity. As surveillance grows more sophisticated, traditional privacy browsers, while helpful, often fall short in protecting users' privacy.
OSINT The OSINT Intelligence Cycle Part 1: Planning and Direction My advice for those wishing to improve their OSINT skills is to go back to the basics, namely the intelligence cycle.
OSINT OSINT & The Intelligence Cycle Part II: Lets Talk About Collection Part two of my guide to the OSINT intelligence cycle. Once you mapped out your planning and direction phase, the next step is collection.
OSINT OSINT & The Intelligence Cycle Part III: Processing Raw Intelligence This OSINT part 3 post explains how to take the raw intelligence and refines it into forms better suited for exploitation and analysis.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
OSINT OSINT & The Intelligence Cycle Part Five: Dissemination Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.
INFOSEC SecjuiceCON 2025 SecjuiceCON, our first virtual conference, will be held on March 30, 2025, starting at noon America/New_York timezone.
HTB Escape Walkthrough A very specific Windows machine, in which I found myself stuck, persistently searching for an exploit that later revealed itself to be a straightforward clue that facilitated a trivial privilege escalation. The subsequent privilege escalation led me to the desired root flag.
TECHNICAL HTB Stocker Walkthrough Simple BOX on both flags, much more root than the user, still fun and great for beginners.
TECHNICAL HTB Busqueda Walkthrough A nice and simple BOX with two relatively simple exploits even for beginners.
TECHNICAL HTB PC Walkthrough Let’s talk about another relatively simple BOX. It starts unusually, but it quickly reveals its true nature: simplicity. Let’s avoid unnecessary descriptions.
TECHNICAL HTB Topology Walkthrough This box is incredibly intriguing, especially the first part. However, the search for the appropriate exploit proved to be quite challenging. It required a more sophisticated user flag than the root flag.
TECHNICAL HTB Keeper Walkthrough A simple yet intriguing BOX that piqued my interest for personal reasons this time. Apart from a few minor unexpected hiccups, I successfully cracked it with straightforward steps that are accessible to even beginners. An excellent BOX for learning.
TECHNICAL HTB Analytics Walkthrough The BOX is a great starting point for beginners, especially those who are new to the field. It’s easy to use and execute, apart from a few minor issues that don’t affect its simplicity.
TECHNICAL HTB Outdated Walkthrough This Windows Box is incredibly intriguing, featuring challenging passages and an unstable machine. Despite these difficulties, it’s an enjoyable experience with numerous exploits available.
TECHNICAL HTB MetaTwo Walkthrough A simple box with a user flag is slightly more intricate than the root flag, yet it still challenges the patience and resilience of a penetration tester.
TECHNICAL Featured Infostealers: An Overview We’ll dive into the sneaky world of infostealers, malware that steals your secrets like a ninja!
INFOSEC The CMMC Countdown, Part 4 This high-level review of the five-point controls required for a conditional certificate will wrap up the CMMC action plan.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.
OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
INFOSEC The CMMC Countdown: The Action Plan, Part 3 Continue your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
TECHNICAL HTB Precious Walkthrough Learn how to hack the box with this simple, vulnerable box. A simple nmap scan reveals a web page converter with a vulnerability in the pdfkit tool.
TECHNICAL HTB Soccer Walkthrough Learn how to break into a soccer portal using vulnerabilities in the Tiny File Manager hidden route.
TECHNICAL HTB MonitorsTwo Walkthrough Learn how to exploit a vulnerable Catci instance in this hack the box post.