BreakICT 2022 CTF Walkthrough (Part 1)
Part 1 of a series of walkthroughs for the BreakICT CTF at OzSec 2022. Today we take on four of the challenges ranging from web discovery to identifying and decoding messages.
Read More
Anatomy of a Reverse Shell: nc named pipe
Breaking down the cryptic reverse shell using nc and named pipes. How the reverse shell works, and a hands-on docker lab to test out reverse shells.
Read More
Remediating Nessus Plugin ID 139239 "Windows Security Feature Bypass in Secure Boot (BootHole)"
How do you remediate BootHole as identified by Nessus Plugin ID 139239 in Windows systems? Here we will be discussing this vulnerability and how to properly remediate it from your Windows hosts.
Read More