Open in app

Sign in

Write

Sign in

Amol Rangari
Amol Rangari

114 Followers

Home

About

Pinned

What is Security Opeartions Center( SOC)?

A security operations center (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. The SOC team’s goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set…

Cybersecurity

3 min read

Cybersecurity

3 min read


Jun 6

New MOVEit Transfer zero-day mass-exploited in data theft attacks

Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023–34362, to steal data from organizations. MOVEit Transfer is a managed file transfer (MFT) solution developed by Ipswitch, a subsidiary of US-based Progress Software Corporation, that allows the enterprise to securely transfer files between…

Cybersecurity

5 min read

Cybersecurity

5 min read


Mar 10

New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access

Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that could enable a threat actor to take control of affected systems. The issue, tracked as CVE-2023–25610, is rated 9.3 …

Cyber Security Awareness

2 min read

Cyber Security Awareness

2 min read


Dec 16, 2022

Advent of Cyber 2022| [Day15]| TryHackMe write-up

Learning Objectives Input validation of file upload funtionality Unrestricted file upload vulnerabilities Phishing through file uploads How to properly secure file upload functionality The Unrestricted in Unrestricted File Uploads The ability to upload files to a server has become integral to how we interact with web applications. Just think of…

Tryhackme Writeup

3 min read

Advent of Cyber 2022| [Day15]| TryHackMe write-up
Advent of Cyber 2022| [Day15]| TryHackMe write-up
Tryhackme Writeup

3 min read


Dec 15, 2022

Advent of Cyber 2022| [Day14]| TryHackMe write-up

Learning Objectives Web Applications The Open Web Application Security Project (OWASP) Top 10 IDOR Web Application A web application is a piece of software that we can use via a web browser. Unlike computer programs and smartphone applications, a web application does not require any installation on the user’s system to make use of…

Information Security

5 min read

Advent of Cyber 2022| [Day14]| TryHackMe write-up
Advent of Cyber 2022| [Day14]| TryHackMe write-up
Information Security

5 min read


Dec 15, 2022

Advent of Cyber 2022| [Day12]| TryHackMe write-up

Learning Objectives Learn the fundamentals of analysing malware samples without relying on automated sandbox scanners. Learn and understand typical malware behaviour and its importance in the incident investigation pipeline. Key Malware Behaviours Before touching the malware sample for this task, we need to briefly introduce common malware behaviours to have…

Information Security

4 min read

Advent of Cyber 2022| [Day12]| TryHackMe write-up
Advent of Cyber 2022| [Day12]| TryHackMe write-up
Information Security

4 min read


Dec 12, 2022

Advent of Cyber 2022| [Day10]| TryHackMe write-up

Learning Objectives Learn the fundamentals of analysing malware samples without relying on automated sandbox scanners. Learn and understand typical malware behaviour and its importance in the incident investigation pipeline. Key Malware Behaviours Before touching the malware sample for this task, we need to briefly introduce common malware behaviours to have…

Advent Of Cyber 4

9 min read

Advent of Cyber 2022| [Day10]| TryHackMe write-up
Advent of Cyber 2022| [Day10]| TryHackMe write-up
Advent Of Cyber 4

9 min read


Dec 12, 2022

Advent of Cyber 2022| [Day11]| TryHackMe write-up

The elves in Santa’s Security Operations Centre (SSOC) are hard at work checking their monitoring dashboards when Elf McDave, one of the workshop employees, knocks on the door. The elf says, “I’ve just clicked on something and now my workstation is behaving in all kinds of weird ways. …

Cybersecurity

10 min read

Advent of Cyber 2022| [Day11]| TryHackMe write-up
Advent of Cyber 2022| [Day11]| TryHackMe write-up
Cybersecurity

10 min read


Dec 9, 2022

Advent of Cyber 2022| [Day9]| TryHackMe write-up

Learning Objectives Using Metasploit modules and Meterpreter to compromise systems Network Pivoting Post exploitation Concepts What is Docker? Docker is a way to package applications, and the associated dependencies into a single unit called an image. This image can then be shared and run as a container, either locally as a developer or remotely on a…

Tryhackme

2 min read

Advent of Cyber 2022| [Day9]| TryHackMe write-up
Advent of Cyber 2022| [Day9]| TryHackMe write-up
Tryhackme

2 min read


Dec 9, 2022

Advent of Cyber 2022| [Day8]| TryHackMe write-up

Last Christmas I gave you my ETH Disclaimer: The purpose of this writeup is to help you when you get stuck not to do it for you. Obviously people at TryHackMe spent quite a lot of time creating this challenge. Please go through provided material first. ( you can learn something, after all. ;) What flag is found after attacking the provided EtherStore Contract? As always please read/watch the whole thing and then you can actually learn something. ;)

Cybersecurity

2 min read

Advent of Cyber 2022| [Day8]| TryHackMe write-up
Advent of Cyber 2022| [Day8]| TryHackMe write-up
Cybersecurity

2 min read

Amol Rangari

Amol Rangari

114 Followers

I am Cyber Security Expert, Security Researcher and bug hunter

Following
  • Cory Doctorow

    Cory Doctorow

  • Taimur Ijlal

    Taimur Ijlal

  • Michael Wahl

    Michael Wahl

  • Vishnu Shivalal P

    Vishnu Shivalal P

  • Andre Camillo

    Andre Camillo

See all (56)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams