INFOSEC Featured Secjuice Squeeze 75 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Previse Walkthrough Andy From Italy gives us a fantastic HTB walkthrough exploiting the mySQL database on the Previse BOX!
INFOSEC Secjuice 2021 Writer of the Year Winner: Andy From Italy The 2021 Secjuice Writer of the Year award goes to our Hack The Box write-up legend, the one and only–Andy From Italy!
TECHNICAL TryHackMe Mr. Robot CTF Writeup Gurkirat Singh publishes his final write-up for 2021 on the TryHackMe Mr. Robot CTF, and demonstrates how to get root access into the Mr. Robot room and more!
INFOSEC On Writing Better Ross Moore provides us an excellent guide filled with timeless advice on how to write better for infosec (and in general too), even if English isn't your first language!
TECHNICAL TryHackMe Bounty Hacker Write-up Gurkirat Singh pushes out another one of his final TryHackMe write-ups for the year 2021 based on the room called Bounty Hacker! He shares how you can exploit the sudo misconfiguration when there's a password reusable vulnerability in the system and more!
TECHNICAL HTB Writer Walkthrough Secjuice Writer of the Year 2021, Andy From Italy, writes up the final HTB walkthrough of the year on the Linux-based BOX titled Write (which we find so cleverly appropriate and fitting).
INFOSEC Four-Step Intelligence Model for Decision Making Mars Groves explains the four steps of the OODA Loop model used in intelligence for decision-making, which is very useful for difficult and time-sensitive situations.
INFOSEC Against Child Pornography Child pornography awareness is crucial to society and hardly spoken about. Alesanco stands against child exploitation and shares important methods on how we can protect children from the dangerous threats of real life monsters.
TECHNICAL TryHackMe Road Challenge Walkthrough A detailed walkthrough on Linux privilege escalation with the TryHackMe web-to-root machine named Road.
TECHNICAL HTB BountyHunter Walkthrough A technical walkthrough of the HackTheBox BountyHunter challenge!
TECHNICAL TryHackMe Writeup: HackPark A technical writeup of the TryHackMe room HackPark reveals methods of system exploitation and gaining root privileges!
INFOSEC The Tabletop Exercise (TTX) In this article, we will explore information security tabletop exercises (TTXs)!
INFOSEC Writer Of The Year Nominees Welcome to the annual Secjuice Writer Of The Year awards, the most prestigious writers award in infosec whose winner is chosen exclusively by writers.
TECHNICAL HTB Explore Walkthrough The most prolific box smasher in Italy returns with another excellent HackTheBox technical writeup.
TECHNICAL HTB Love Walkthrough The most prolific box smasher in Italy returns with another excellent HackTheBox technical writeup.
TECHNICAL HTB Seal Walkthrough The most prolific box smasher in Italy returns with another excellent HTB technical writeup.
TECHNICAL HTB Cap Walkthrough The most prolific box smasher in Italy returns with another excellent HTB technical writeup.
CYBERSEC Passwords: Are Words Better Than Random Letters? These good password strategies can enhance your bad password security habits.
CYBERSEC DevOps: The CAMS Model In this article, we will ignore the Sec in DevSecOps and focus on DevOps.
TECHNICAL Attack Defense: Windows Basic Exploitation #11 Learn to exploit a vulnerable windows service WinRM using Powershell.
CYBERSEC Don't Forget About Spooling! How does spooling serve as a gateway for hackers to breach your cybersecurity, and how do you fix the vulnerabilities?