πŸ”Ž MisCloud is just retired! Walkthrough disclosure - right from the clouds πŸ˜Άβ€πŸŒ«οΈ

πŸ”Έ Google Cloud Services logs
πŸ”Έ Intense PCAP analysis
πŸ”Έ Really nice real-life scenario

πŸ”— https://blog.cyberethical.me/htb-sherlock-miscloud

Want to try investigations yourself?

πŸ”— https://blog.cyberethical.me/go-htbapp

#CyberEthical #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #googlecloudservices #gcs #pcap #wireshark

πŸ‘€ Have you heard the news?
This year, I'm dropping a sick content on my blog. Keep your eye on the #CyberEthical and Stay Secure!

Ladies and gentlemen prepare.. to hold.. your.. color 😎
πŸ”— https://blog.cyberethical.me/

And all of these wouldn't be possible without Hack The Box!
πŸ”— https://blog.cyberethical.me/go-htbapp

πŸ’£ Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ Code #deobfuscation
πŸ”Έ hashtag#Telegram data exfiltration
πŸ”Έ Malware behavioral analysis

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware

πŸ’£ Full write-up for ToolPie this year's forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ PCAP (network capture) analysis
πŸ”Έ Python bytecode, marshalling, decompiling

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-toolpie

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #python #pcap #wireshark #EthicalHacking #blueteaming #itsec #dataexfiltration

✴ Quick update, there will be most certainly a delay in Sherlocks' writeups publishing as because of following the rule "from most to least solves" my stupid ass started solving the active ones for which I am not allowed to publish writeups yet πŸ˜…

So I have 4 of these waiting in queue, but can't really do anything about them now 😬

#dfir #cyberethical #hacking #writeup #hackthebox

HTB Sherlock: Bumblebee

πŸ’‘ This write-up is a part of the HTB Sherlocks series. Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware ana...

CyberEthical.Me: Hacking for the Security Awareness

Have you seen the Break The Glass Account or Break Glass Procedure somewhere in your organization?

"Break-glass access is granted through a dedicated break-glass account which is traditionally created in advance. The account is typically highly privileged and allows access to the most critical systems, like root accounts. For that reason, break-glass accounts are well monitored, documented, tested, and managed to avoid any misuse. "

https://www.ssh.com/academy/secrets-management/what-is-break-glass-access

#CyberEthical #ITSec

What is Break-Glass Access? | SSH

Break-glass access refers to an emergency procedure used when a user with insufficient access is granted elevated access rights to bypass normal controls.

Starting a new series of write-ups! I'd like to cover all Sherlocks from HackTheBox over next months, so stay tune!

Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware analysis!

https://blog.cyberethical.me/htb-sherlock-meerkat

#CyberEthical #CyberKnowledge #CyberSecurity #hacking #pentesting #pentester #infosec #ethicalhacking #whitehat #dfir #soc

HTB Sherlock: Meerkat

πŸ’‘ This write-up is a part of the HTB Sherlocks series. Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware ana...

CyberEthical.Me: Hacking for the Security Awareness
Forensics: Oblique Final

Introduction As the days for the final round of the game, draw near, rumors are beginning to spread that one faction in particular has rigged the final! In the meeting with your team, you discuss that if the game is indeed rigged, then there can be ...

CyberEthical.Me: Hacking for the Security Awareness

πŸ¦‡ Would it be possible to solve the Capture The Flag event only by using AI models? With the popularization of ChatGPT and BingAI more and more script-kiddies and people without prior knowledge can create malware and malicious scripts to harm others.

But what if cybersecurity enthusiasts can use that power to prompt through the CTFs? Would that mean the end of one era in hacking competitions?

🌿 See my attempt to an AI assisted approach to the Securing Midsummer Corp Hack CTF.

πŸ”— https://blog.cyberethical.me/solving-securing-ctf-with-open-ai

#CyberEthical #cybersecurity #ai #hacking #openaichatgpt #chatgpt #bingai #chatgpt #learning #ctf

Solving a CTF using OpenAI models

The Plan There is something I wanted to try since I've watched videos of people creating games without any programming knowledge whatsoever. After I have created a honeypot using the ChatGPT v3, I'm ready to solve the CTF using AI only: ChatGPT and B...

CyberEthical.Me: Hacking for the Security Awareness