Uncategorized

Top OSCP Resources

Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey

Useful OSCP Links   OSCP Syllabus:  https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/  Windows Privilege Escalation:  http://www.fuzzysecurity.com/tutorials/16.htmlhttps://pentest.blog/windows-privilege-escalation-methods-for-pentesters/http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.htmlhttps://toshellandback.com/2015/11/24/ms-priv-esc/  Windows Post Exploitation:  http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdfMubix: https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US  Linux Privilege Escalation:  https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells  Linux Post Exploitation:  https://n0where.net/linux-post-exploitation/Mubix: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM- 1N-EWPRz2770K4/edit?hl=en_US   Metasploit  https://www.offensive-security.com/metasploit-unleashed/http://www.securitytube.net/groups?operation=view&groupId=8Postex: https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekq  Pivoting:  https://pentest.blog/explore-hidden-networks-with-double-pivoting/http://nerderati.com/2011/03/17/simplify-your-life-with-an-ssh-config-file/  OSCP Reviews:  https://localhost.exposed/path-to-oscp/http://www.en-lightn.com/?p=941http://www.securitysift.com/offsec-pwb-oscp/https://blog.g0tmi1k.com/2011/07/pentesting-with-backtrack-pwb/http://www.jasonbernier.com/oscp-review/https://n3ko1.github.io/certification/2015/05/27/oscp—offensive-security-certified-professional/  Precompiled Exploits:  https://github.com/offensive-security/exploit-database-bin-sploits  Some of best courses recommended by us to boost your career … Unleashing the Power of Linux

Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey Read More »

Top tools for SOC analysts

Boost Your SOC Analyst Skills with the Best Tools for the Job

Best Tools For SOC Analysts In this blog we are going to see Best tools for SOC analysts, Top tools for SOC analysts. You can also see SOC analyst interview questions and answers. 1. Investigation Tools 1. Process Hacker A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.

Boost Your SOC Analyst Skills with the Best Tools for the Job Read More »

Network Communication Protocols Map free download

NETWORK COMMUNICATION PROTOCOLS MAP DOWNLOAD

NETWORK COMMUNICATION PROTOCOLS MAP FREE DOWNLOAD Network communication protocal map free cheat sheet download, OSI model cheat sheet download, Application Layer, Presentation Layer, Session Layer, Transport Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer, TCP/IP Microsoft Novell IBM ISO VolP VPN/Security Click on the download button and wait for 15 seconds… Free Download

NETWORK COMMUNICATION PROTOCOLS MAP DOWNLOAD Read More »

Penetration tester Vs SOC analyst

SOC Analyst vs. Penetration Tester: Understanding the Differences and Choosing the Right Career Path

SOC analyst Vs. Penetration tester Candidates who want to pursue a career in cyber security should have knowledge of the sub-branch of cyber security that they want to specialize in. In this article, we discuss penetration tester and SOC analyst, two important professions in the industry and explain what employees in both professions do, their

SOC Analyst vs. Penetration Tester: Understanding the Differences and Choosing the Right Career Path Read More »

What is cryptography and its terminlogies

Unleashing the Power of Cryptography: Understanding the Basics and Terminologies

What is cryptography ? Cryptography is an art of converting the plain text into unintelligible format (Cipher text ). On the receiver side that cipher text is converted into plain text. Cryptography mainly aims at privacy and integrity. Cryptography is not latest technique, it has formed thousand of years ago. But they uses some symbols

Unleashing the Power of Cryptography: Understanding the Basics and Terminologies Read More »

Scroll to Top
www.thecyberblogs.com