Since I have taken Antisyphon training in the past, I am on their email list. I noticed that I received an email from them on November 21st about their Turkey Express Mini CTF. I know about their cyber range but never signed up for it, even though I was curious. Since they released this CTF, I will treat this as a sample for their cyber range. It may not be fair, but I do not have anything to go on. Challenges When I signed up for their CTF, I was delighted to see there were …
Information Security
Passed eJPTv2
Today, I received an email from INE that I passed my eJPTv2 beta exam. It means that I obtained the eJPT certification again, but this time it is for version 2. I discussed my beta exam experience here. I suggest you read it and come back to this. There might be some information that you would want to know before reading the rest of this post. Preparation I received an email from INE on August 8th that they selected me to participate in the eJPTv2 beta program. I started going …
Passed GCIA
I recently passed the GCIA (GIAC Certified Intrusion Analyst) certification exam, and I wanted to share my experience. As a follower, you may remember that I scored almost perfect on my GCIH exam. With this exam, however, I scored nowhere near it, and I am okay with that. Exam information The exam has the following format: 106 questions (including CyberLive)4 hours68% passing scoreMultiple-choice and single-answerYou can skip questions (up to 10 if I remember correctly)You can …
Attacking Cisco IOS device
Cisco IOS-related CVEs get announced consistently, but we will not be exploring any of those in this article. I will, however, demonstrate that attacking a Cisco IOS device is possible with SNMP misconfiguration. If interested, I covered another attack on a Cisco IOS device running HSRP here. I included this exercise on our Paradise Lost: Red Team versus Blue Team event during our CyberFest 2021. Unfortunately, only the blue team members touched this node. The red team focused on …
Kaos Corp: Cayenne
In the previous article, we found the ransomware key, and now we are on the hunt for the Windows AD domain controller to decrypt the research data, which also contains the flag. In this article, we will concentrate on the host named Cayenne. Discovery Since we already performed host discovery, we do not need to do it again. However, we need to figure out which ones are Windows-based hosts out of the three left. The quickest way to figure out if a host is running Windows is by pinging, …