Skip to content

Newsletter

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

anotsodev

Attacking and Defending Active Directory Part I

April 24, 2020April 19, 2020 by anotsodev

Reading Time: 3 minutesIntroduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …

Read moreAttacking and Defending Active Directory Part I

Categories Information Security, Network Defense, Penetration Testing, Windows Tags active directory, cybersecurity, Information Security, Penetration Testing, windows

How to identify phishing emails

April 24, 2020April 11, 2020 by anotsodev

Reading Time: 5 minutesThis blog post will help you identify phishing emails and learn what are the tools being used in checking if …

Read moreHow to identify phishing emails

Categories General, Information Security, Network Defense Tags coins.ph, cybersecurity, Information Security, malicious email, mxtoolbox, phishing, talosintelligence

Networking Concepts and Protocols

April 24, 2020March 29, 2020 by anotsodev

Reading Time: 4 minutesThis blog post contains the Networking Concepts and Protocols course that can be enrolled in Pluralsight. Feel free to skim …

Read moreNetworking Concepts and Protocols

Categories Cheatsheets, Networking Tags course, cybersecurity, Information Security, networking, pluralsight, protocols

Poor man’s log collection on Windows

April 26, 2020March 28, 2020 by anotsodev

Reading Time: 4 minutesIntroduction As your organization grows, a lot more log collectors either commercial or freeware are needed to be installed on …

Read morePoor man’s log collection on Windows

Categories Logging, Network Defense, Windows Tags cybersecurity, Information Security, log-collection, network-defense, siem, windows

Hack the Box Optimum

April 24, 2020October 29, 2017 by anotsodev

Reading Time: 6 minutesThis is a write-up of the retired Optimum box on Hack the Box. First thing I did was to fire …

Read moreHack the Box Optimum

Categories Capture The Flag, Hack the Box, Penetration Testing, Writeups Tags hackthebox, optimum, writeup

Building a Slack Bot with Python

April 24, 2020September 28, 2017 by anotsodev

Reading Time: 5 minutesThe slack bot that I will be building has a feature that will automatically fetch the latest tweets from my …

Read moreBuilding a Slack Bot with Python

Categories Programming, Tutorials Tags Bot, Slack, Tutorial

Hack the Box Legacy Get System no Jutsu

April 24, 2020September 10, 2017 by anotsodev

Reading Time: 7 minutesThis post contains the actual commands that I used in hacking and getting the user and root hashes on HTB …

Read moreHack the Box Legacy Get System no Jutsu

Categories Capture The Flag, Hack the Box, Penetration Testing Tags hackthebox, legacy, windows, writeup

Vulnhub SkyDog 2016 – Catch Me If You Can

April 24, 2020August 31, 2017 by anotsodev

Reading Time: 9 minutesThe SkyDogConCTF is one of the most enjoyable CTF challenges that I have ever played because it contained a lot of …

Read moreVulnhub SkyDog 2016 – Catch Me If You Can

Categories Capture The Flag, Vulnhub, Writeups Tags catchmeifyoucan, linux, skydog, vulnhub, writeup

Vulnhub Tr0ll 1

April 24, 2020August 25, 2017 by anotsodev

Reading Time: 5 minutesStarted with the Nmap Scan # Nmap 7.40 scan initiated Thu Aug 3 20:58:47 2017 as: nmap -sC -sV -oA …

Read moreVulnhub Tr0ll 1

Categories Vulnhub, Writeups Tags ctf, linux, vulnhub, writeup

Phases of Penetration Testing

April 24, 2020August 24, 2017 by anotsodev

Reading Time: 3 minutesPenetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in …

Read morePhases of Penetration Testing

Categories Penetration Testing Tags Information Security, Methodologies, phases
Older posts
Page1 Page2 Next →
Copyright © 2025 anotsodev - Information Security Blog