This page contains different useful tips and tricks on Cyber Security from our expert Siddique Reza Khan. Contact us for more details.
8th July 2024
Buffer Overflows
This topic explains how to get started with basic Buffer Overflows.
Buffer overflow vulnerabilities are a critical concept in cybersecurity, allowing attackers to exploit memory management weaknesses in software. The TryHackMe room “Buffer Overflows” provides an excellent introduction to this topic, offering hands-on practice with x86-64 Linux programs. Download pdf below for a brief overview of the process and key tasks involved in buffer overflow.
25th July 2024
Publisher Room – TryHackMe
This topic explains the penetration testing of the Publisher room on TryHackMe. The objective of this work is to enumerate and exploit vulnerabilities to achieve complete ownership of the target machine. The assessment uncovered several security weaknesses, culminating in successful privilege escalation and root access.
8th August 2024
Overview and Fundamental Usage of Wireshark
Wireshark is a powerful network traffic analyzer used for detecting and troubleshooting network problems, identifying security anomalies, and investigating protocol details. This tool allows analysts to capture and interactively browse the traffic running on a computer network. Below is a detailed guide on its usage, interface, and functionalities.
10th September 2024
Use Case Scenario: Defending Against APT28 Using the MITRE ATT&CK Framework
E-corp, a manufacturer of rare earth metals for government and non-government clients, has received classified intelligence indicating a potential cyber attack from APT28, a known advanced persistent threat (APT) group. As a SOC analyst, Sunny needs to identify the tactics, techniques, and procedures (TTPs) of APT28 using the MITRE ATT&CK Framework to proactively protect E-corp’s network from potential intrusions. Below is a detailed document explaining the process of using the MITRE ATT&CK Framework.
19th September 2024
A General Overview of Data Center Design, Architecture, and Security
In the modern digital age, the demand for uninterrupted, secure, and efficient access to data and services has driven the evolution of data centers. A data center serves as the backbone of many technological services by hosting IT infrastructure for enterprises, cloud providers, and businesses. It houses critical systems that run business applications, store and process vast amounts of data, and provide networking services to internal and external users. This paper aims to explore the fundamental components of a data center, its architectural design, physical and cybersecurity aspects, and key standards that govern its operations. In addition, we will present an approach to designing and building a data center that aligns with industry best practices.
