This beginner friendly CTF is a perfect first challenge for those new to CTFs to cut their teeth. If this is your first time or you are stuck on a task, always try googling what it asks and considering the hint before finding the answers on walkthroughs like this one!
If you're new to the world of CTFs, or want some simple challenges that won't take hours of commitment to break, PicoCTF is a great starting point. The platforms challenges are short and begin from a low difficulty level - meaning even those new to information security can start here,
Get started with Linux in an infosec environment with hands-on challenges.
This week saw yet another example of poor security in public infrastructure - this time a Floridian water treatment plant. Game developer CD Project RED stands firm and refuse to bargain ...
Whether you are studying for a cloud certification or working to migrate on-premises IT to the cloud, three terms you will constantly hear are IaaS, PaaS, and SaaS. These three concepts can be easy to confuse at first, yet they are the backbone of the cloud model. no matter which vendor you choose.
On Dec 13 SolarWinds, vendors of incredibly commonplace network monitoring tools, published a security advisory noting that their Orion platform had been compromised, leaving nearly 18000 customers - including numerous government agencies - compromised and vulnerable.
December 15ths challenge serves introduction to python, teaching basic python syntax and conventions
In the Christmas Chaos scenario, you are challenged to recover the control panel for Santa’s sleigh after it has been compromised by a rouge actor. This challenge gives us practical experience using Burp Suite and FoxyProxy to intercept packets and an understanding of simple web authentication.
The second challenge, The Elf Strikes Back, tasks you with performing a security audit on a new tool developed to report any suspicious people around the factory... This web exploitation task builds knowledge of query strings, HTTP methods, reverse shells, and working with simple shell scripts.
If you're new to THM or you didn't take part in Advent of Cyber last year, it’s basically a CTF challenge room with new challenges dropping each day leading up to Christmas.
Regions in Azure refer to the approximate physical locations data centers exist. All Regions are made up of Availability Zones, which are singular and independent data centers.
With renewed efforts to innovate and ship new features following their acquisition by Microsoft, GitHub quietly launched one of their most loved features yet — personal readmes. Personal readmes are markdown files that display front and centre on your GitHub profile, allowing you to introduce yourself with more freedom than your
7 of the most creative uses of GitHubs new personal readmes' feature.
Integrity checking files - or checking against a provided hash value is a common and easy way to be certain a file or program has not been tampered with or perhaps damaged during download and transmission.
Creating a virtual Windows Server test environment.