Cyber Threat Intelligence is an area that is not well known outside of the cybersecurity industry, but is quickly growing in both popularity and importance. Cyber attacks are becoming more potent and frequent, and skilled individuals are needed to make sense of these events and be able to deliver information in a form that enables action and pre-emption.

What is Cyber Threat Intelligence?

Cyber Threat Intelligence is the art, or science (depending on how you look at it) of collecting and analysing information, using context to turn said information into actionable intelligence which businesses can then use to make decisions around their security. …


The deep web is the part of the internet that is not indexed by search engines. A part of the deep web is the dark web, which exists inside layered proxy networks, so-called darknets. Of these darknets, Tor is by far the largest.

Dark Web Marketplaces are online shops termed as tor marketplace or deepweb markets offering various illicit goods and services like firearms or guns, stolen credit card details, steroids, fake passports, etc. Different darkweb marketplaces offer to buy illegal drugs online like LSD, Cannabis, Cocaine, etc., which are easily available on dark web drug markets.

DISCLAIMER: Each and…


When we talk about hardware hacking — we have physical device as attack surface, we have embedded devices to pentest on, One may try to start pentesting that piece of hardware by enumeration some useful information with the help of few tools will be listed below.

By opening the casing of device there’s a motherboard on which all the circuitry is present which can give us an how the device works like what IC the device is using. …


Reverse engineering is the process of understanding the particular aspects of the program, which are listed below to identify the components of the system and the interrelationship between the components. And enhance the components of the system and improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0’s and 1’s usually sent to the logic processor) back into the programmable language statements which are called source code. Software reverse engineering is done to get the source code of the program because to know how…


This is a Mr Robot themed CTF originally taken from Vulnhub.Here We Bruteforce Wordpress login pannel to find a valid user and Bruteforce again to find a valid password.Once we are in, we upload a php shell on Wordpress Theme to get a reverse shell and privilege escalate using Suid and Nmap.

NOTE: This room on TryHackMe seems to be buggy and does not respond to certain directories and directory bruting using tools like dirb and gobuster so it is suggested that you download the ova file of MrRobot from Vulnhub and setup the MrRobot machine in your Vmware.Make sure…


Brainpan 1 is a room perfect for Stack Based Buffer Overflow prep for OSCP.If you are new to Buffer Overflows, do complete the “Buffer Overlow Prep” room in TryHackMe by Tib3rius and refer to his walkthrough video as well.

NOTE: This writeup has been made as a part of note keeping and i will only cover the privilege escalation part.For the initial Buffer Overflow process, refer to my previous article in which i have explained it step by step.

Privilege Escalation

Run the final exploit, and we finally get a shell.In …


(Room-OVERFLOW-1) Run our Immunity Debugger as Administrator and open the oscp.exe


This blog contains a complete explanation of How Active Directory Works,Kerberoasting and all other Active Directory Attacks along with Resources.This blog is written as a part of my Notes and the materials are taken from tryhackme room “Attacking Kerberos”

Before you start the tryhackme room called “Attacking Kerberos” which will be really confusing for people new to it, i would suggest you to finish these videos for a complete understanding of the subject.

https://www.youtube.com/watch?v=_44CHD3Vx-0

https://www.youtube.com/watch?v=_44CHD3Vx-0

— [NOTES] —

AD DS contains a database called NTDS.dit(needed to store and manage directory information such as users, groups, and service) NTDS.dit is stored in %SystemRoot%\NTDS

Domain…

ZeusCybersec

I am a Penetration Tester, Currently pursuing OSCP. Skilled in Network Pen-testing and Developing Hacking Tools using Python.I Share my Knowledge on YouTube

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store