10 open-source recon tools worth your time

Recon is the initial stage in the penetration testing process. It’s a vital phase allowing the tester to understand their target and strategize their moves. Here are ten open-source recon tools that deserve to be in your arsenal. Altdns Altdns is…

June 20, 2023
Read More >>

Hack The Box: Escape machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Escape Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Escape machine? For the user flag, you will need to manage to obtain the database credentials inside the PDF file. […]

The post Hack The Box: Escape machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

June 17, 2023
Read More >>

Hack The Box: Soccer Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Soccer Machine from Hack the Box This room will be considered an Easy machine on Hack The Box What will you gain from the Soccer machine? For the user flag, you will find a website that is managed using Tiny FileManager. We will use […]

The post Hack The Box: Soccer Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

June 10, 2023
Read More >>

Hack The Box: TwoMillion Machine Walkthrough -Easy Difficulty

In this post, I would like to share a walkthrough of the TwoMillion Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the TwoMillion machine? For the user flag, you will need to present the old UI of the HackTheBox platform which previously […]

The post Hack The Box: TwoMillion Machine Walkthrough -Easy Difficulty appeared first on Threatninja.net.

June 8, 2023
Read More >>

Grounded by Cybersecurity: Protecting the Aviation Industry from Digital Threats

Securing aviation systems involves proactively identifying, assessing, and addressing potential security vulnerabilities within aviation infrastructure. The work entails simulating cyber-attacks and exploiting weaknesses within the aviation ecosystem. These include communication networks, air traffic control systems, and aircraft avionics. By emulating the techniques, tactics, and procedures (TTPs) of real-world threat actors, cybersecurity professionals can uncover hidden vulnerabilities and evaluate the resiliency of aviation systems against cyber intrusions. The findings from these tests can then be used to develop effective countermeasures, enhance security policies, and contribute to the safety of passengers, crew, and ground personnel.

June 1, 2023
Read More >>

Hack The Box: Absolute Machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Absolute Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Absolute machine? For the user flag, you will need to abuse the vulnerability with AS-REP-Roast to retrieve credentials and figure […]

The post Hack The Box: Absolute Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

May 27, 2023
Read More >>