Follina This is an incident response challenge on BTLO. It is categorised as easy. To complete this challenge, the following tools were useful. VirusTotal Any.Run Scenario On a Friday eve...
FOLLINA
HAUNTED
HAUNTED scenario Haunted Company Inc., a long-established Credit Reporting Agency, has been successfully operating in major financial hubs such as New York, London, and Tokyo. As a privately o...
SOC Home Lab Setup
How To Automatically BackUp your Obsidian Notes
How To Automatically BackUp your Obsidian Notes One of the good qualities of a Cybersecurity professional is being able to keep your notes. Now imagine if you accidentally
Red Stealer Blue Team Lab
Android secret codes to know if you are being hacked or tacked/tapped
With technology advancing each day, more ways to hack or spy are being invented. With that said, what is the probability that you are hacked or someone is spying into your android device (doesn’t...
Decoding Windows Event IDs
A Comprehensive Guide to System Monitoring In our previous blog post, we explored the Windows Event Viewer as a powerful tool for monitoring and troubleshooting Windows systems. One of the most es...
Demystifying Windows Event Viewer
Your Guide to System Monitoring and Troubleshooting Windows Event Viewer is a powerful built-in tool that often remains underutilized by many users. Whether you’re a seasoned IT professional or ju...
Hide Recyclebin Icon using GPO
Hiding the Recycle Bin Icon Using a Group Policy Object Having seen the power of group policy objects in the previous article, let us see how to practically create and enforce one. In the Windows S...
The Power of Group Policy Objects - GPOs
Group Policy Objects (GPOs) are a vital component of Active Directory (AD) that allow administrators to apply and enforce various settings across the network. They are a powerful tool for centraliz...