Posts

DEATHNOTE: 1 VulnHub CTF

Image
  In this blog, we will solve a capture-the-flag challenge ported on the Vulnhub platform by an author named  HWKDS . As per the description, this is a beginner-friendly challenge as the difficulty level is given as easy. As a hint, it is mentioned that this is a straightforward box, and we need to follow the hints while solving this CTF. Prerequisites would be knowledge of Linux commands and the ability to run some basic pen-testing tools. https://download.vulnhub.com/deathnote/Deathnote.ova   For those who are not aware of the site, VulnHub is a well-known website for security researchers that aims to provide users with a way to learn and practice their hacking skills through a series of challenges in a safe and legal environment. The steps Getting the IP address with the Netdiscover utility Identify open ports through Nmap  Enumerating HTTP service Critical File Found Running brute force through Hydra Escalating pr...

Configuring splunk forwarder in windows machine

Image
  Configuring forwarder in windows machine to forward the logs to SPLUNK in real time. The Splunk universal forwarder is a free, dedicated version of Splunk Enterprise that contains only the essential components needed to forward data. TechSelect uses the universal forwarder to gather data from a variety of inputs and forward your machine data to Splunk indexers. The data is then available for searching. REQUIREMENTS: -                             WINDOWS OS           SPLUNK FORWARDER STEPS: =>  Configuring forwarder in windows machine to forward the logs to SPLUNK in real time. Pc1 = windows 10 . Pc2 = virtual windows machine .   => Download Splunk universal forwarder   in pc2 And run this .msi file . =>Click customize options . and ser path for Splunk forwarder  =>Click ok . =>no ssl certificate so click next. =>...

Malware analysis tools

Image
  Best malware analysis tools and their features. Malware has become a huge threat to organizations across the globe. Something as simple as opening an email attachment can end up costing a company millions of dollars if the appropriate controls are not in place. Thankfully, there are a plethora of malware analysis tools to help curb these cyber threats. When responding to a security incident involving malware, a digital forensics or research team will typically gather and analyze a sample to better understand its capabilities and guide their investigation. There are a number of tools that can help security analysts reverse engineer malware samples. The good news is that a few malware analysis tools are completely free and open source.  1.peStudio This is an excellent tool for conducting an initial triage of a malware sample and allows me to quickly pull out any suspicious artifacts. Once a binary has been loaded it will quickly provide the user with hashes of the ma...