<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity on JO's USB</title><link>https://josusb.com/categories/cybersecurity/</link><description>Recent content in Cybersecurity on JO's USB</description><generator>Hugo -- gohugo.io</generator><copyright>Copyright © 2021-2024 JO. All Rights Reserved.</copyright><lastBuildDate>Sat, 08 Jun 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://josusb.com/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>CTF Guide: Malbuster</title><link>https://josusb.com/blog/ctf-malbuster/</link><pubDate>Sat, 08 Jun 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-malbuster/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the
&lt;a href="https://tryhackme.com/module/malware-analysis" target="_blank" rel="noopener noreferrer">Malware Analysis&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a> module on THM.
In this scenario, you are tasked to analyze unknown malware samples detected
by your Security Operations team.&lt;/p></description></item><item><title>CTF Guide: Benign</title><link>https://josusb.com/blog/ctf-benign/</link><pubDate>Sat, 25 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-benign/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the &lt;a href="https://tryhackme.com/path/outline/soclevel1" target="_blank" rel="noopener noreferrer">SOC Level 1&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a>
learning path on TryHackMe. You are tasked to investigate a compromised
corporate system using limited Splunk logs.&lt;/p></description></item><item><title>CTF Guide: Snort Challenge - Live Attacks</title><link>https://josusb.com/blog/ctf-snort-challenge/</link><pubDate>Fri, 24 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-snort-challenge/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is part of the &lt;a href="https://tryhackme.com/path/outline/soclevel1" target="_blank" rel="noopener noreferrer">SOC Level 1&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a>
learning path on TryHackMe. It simulates active network breaches on a system,
and you are tasked with detecting and remediating the breaches with Snort.&lt;/p></description></item><item><title>CTF Guide: Hunt Me II - Typo Squatters</title><link>https://josusb.com/blog/ctf-huntme-ii/</link><pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-huntme-ii/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is the final challenge of the
&lt;a href="https://tryhackme.com/module/threat-hunting" target="_blank" rel="noopener noreferrer">Threat Hunting&lt;i class="fas fa-external-link-square-alt ms-1">&lt;/i>&lt;/a> module on THM. It follows-up right after Hunt Me I,
but the questions guide the investigation much less than before.&lt;/p></description></item><item><title>CTF Guide: Hunt Me I - Payment Collectors</title><link>https://josusb.com/blog/ctf-huntme-i/</link><pubDate>Fri, 10 May 2024 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-huntme-i/</guid><description>&lt;p>This
&lt;span class="dictionary" data-text="Capture The Flag refers to finding hidden messages (flags) on a computer network as a challenge. Finding flags usually requires some form of hacking. Popular CTF platforms include Hack The Box &amp;amp; TryHackMe.">CTF&lt;/span>
is a threat-hunting practice scenario.
We&amp;rsquo;ll have to investigate malicious activity on a computer that&amp;rsquo;s been the
victim of a phishing attack, from initial access all the way to stealing
confidential data.&lt;/p></description></item><item><title>CTF Guide: You Can't C Me</title><link>https://josusb.com/blog/ctf-you-cant-c-me/</link><pubDate>Fri, 10 Sep 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-you-cant-c-me/</guid><description>Overview# You Can&amp;rsquo;t See Me is a fun CTF on Hack The Box that requires you to reverse engineer a simple C application. It&amp;rsquo;s generally rated as an &amp;ldquo;Easy&amp;rdquo; challenge, and is a good introduction to reversing software and performing malware analysis. As with the other CTF guides, answers will be blurred out. Also for brevity, I won&amp;rsquo;t be including all output of every command.
You can find the link to You Can&amp;rsquo;t See Me here.</description></item><item><title>CTF Guide: Overpass 2 - Hacked</title><link>https://josusb.com/blog/ctf-overpass2/</link><pubDate>Fri, 27 Aug 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-overpass2/</guid><description>Overview# Overpass 2 - Hacked is the second CTF in the Overpass series on TryHackMe, and this scenario has you helping to recover a website that&amp;rsquo;s been hacked! You&amp;rsquo;ll have to analyze a packet capture (PCAP) file with Wireshark to figure out how the attacker got in, then you need to hack back into the server to regain control.
The link to the Overpass 2 - Hacked room is here. You can download Wireshark from the official website.</description></item><item><title>CTF Guide: RootMe</title><link>https://josusb.com/blog/ctf-rootme/</link><pubDate>Mon, 16 Aug 2021 06:16:37 -0400</pubDate><guid>https://josusb.com/blog/ctf-rootme/</guid><description>Overview# RootMe is a short, beginner-friendly CTF on TryHackMe with a ranking of &amp;ldquo;Easy&amp;rdquo;. It&amp;rsquo;s a good complement to practice your skills learned during the &amp;ldquo;Complete Beginner&amp;rdquo; learning pathway, which I recommend completing before attempting this challenge. As usual, direct answers will be hidden in this guide.
You can find the link to the RootMe room here.
The IP address of my target machine was 10.10.255.51, and my attacking machine&amp;rsquo;s was 10.</description></item><item><title>CTF Guide: The Daily Bugle</title><link>https://josusb.com/blog/ctf-dailybugle/</link><pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-dailybugle/</guid><description>Overview# This Marvel-themed, multi-stage CTF is one of TryHackMe&amp;rsquo;s Offensive Pentesting rooms with a difficulty rating of &amp;ldquo;Hard&amp;rdquo;. Some highlights include brute-forcing passwords, SQL injection, and exploiting website templates. Answers in this guide will be hidden or blurred out, as normally.
You can find the link to The Daily Bugle room here.
If you&amp;rsquo;re attempting this CTF, you should already have some foundational knowledge and experience in pentesting. As such, I won&amp;rsquo;t go into much detail into say what nmap arguments mean, or where to get a reverse shell, or how to use John the Ripper.</description></item><item><title>CTF Guide: Skynet</title><link>https://josusb.com/blog/ctf-skynet/</link><pubDate>Sat, 31 Jul 2021 19:44:06 -0400</pubDate><guid>https://josusb.com/blog/ctf-skynet/</guid><description>Overview# This Terminator-themed CTF is one of TryHackMe&amp;rsquo;s Offensive Pentesting rooms, with a ranking of &amp;ldquo;Easy&amp;rdquo;. Exploiting Samba and file inclusion vulnerabilities are some of the highlights here. Direct answers will be hidden in this guide, but before continuing, I recommend that you try hacking this machine without any guides first. Researching on Google, finding red herrings, and even sleeping over the problem are all part of the learning process. Only refer back to this guide when you get stuck for a few days, or want to compare your answers.</description></item><item><title>TryHackMe - Welcome to Cybersecurity</title><link>https://josusb.com/blog/welcome-cybersecurity/</link><pubDate>Fri, 09 Jul 2021 19:49:23 -0400</pubDate><guid>https://josusb.com/blog/welcome-cybersecurity/</guid><description>What is TryHackMe?# TryHackMe (or THM for short) is a mostly free (will come back to this shortly), online platform designed for learning cybersecurity, with a focus on hands-on exercises. It has pre-built learning pathways depending on your security knowledge and what path you&amp;rsquo;d like to explore in cybersecurity. Each learning pathway has a set of rooms, which are essentially short learning sessions focused on security topics, tools, or capture the flag (CTF) events.</description></item></channel></rss>