CyberEthical.Me

78 Followers
9 Following
57 Posts
πŸ‘€ Asentinn
🌟 Hacking for Cybersecurity Awareness
πŸ”Έ #EthicalHacking #Cybersecurity content
πŸ”Έ #Writeups for #CTF and #hacking boxes
πŸ“Œ #CyberEthical
πŸ”Έ Blog πŸ”Έhttps://blog.cyberethical.me
LinkedInhttps://www.linkedin.com/company/cyberethical-me
Instagramhttps://www.instagram.com/cyber.ethical.me

πŸ”Ž MisCloud is just retired! Walkthrough disclosure - right from the clouds πŸ˜Άβ€πŸŒ«οΈ

πŸ”Έ Google Cloud Services logs
πŸ”Έ Intense PCAP analysis
πŸ”Έ Really nice real-life scenario

πŸ”— https://blog.cyberethical.me/htb-sherlock-miscloud

Want to try investigations yourself?

πŸ”— https://blog.cyberethical.me/go-htbapp

#CyberEthical #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #googlecloudservices #gcs #pcap #wireshark

Solved MisCloud from Hack The Box!

I have just solved sherlock MisCloud from Hack The Box

Solved Compromised from Hack The Box!

I have just solved sherlock Compromised from Hack The Box

πŸ‘€ Have you heard the news?
This year, I'm dropping a sick content on my blog. Keep your eye on the #CyberEthical and Stay Secure!

Ladies and gentlemen prepare.. to hold.. your.. color 😎
πŸ”— https://blog.cyberethical.me/

And all of these wouldn't be possible without Hack The Box!
πŸ”— https://blog.cyberethical.me/go-htbapp

πŸ’£ Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ Code #deobfuscation
πŸ”Έ hashtag#Telegram data exfiltration
πŸ”Έ Malware behavioral analysis

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware

πŸ’£ Full write-up for ToolPie this year's forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ PCAP (network capture) analysis
πŸ”Έ Python bytecode, marshalling, decompiling

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-toolpie

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #python #pcap #wireshark #EthicalHacking #blueteaming #itsec #dataexfiltration

✴ Quick update, there will be most certainly a delay in Sherlocks' writeups publishing as because of following the rule "from most to least solves" my stupid ass started solving the active ones for which I am not allowed to publish writeups yet πŸ˜…

So I have 4 of these waiting in queue, but can't really do anything about them now 😬

#dfir #cyberethical #hacking #writeup #hackthebox

HTB Sherlock: Bumblebee

πŸ’‘ This write-up is a part of the HTB Sherlocks series. Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware ana...

CyberEthical.Me: Hacking for the Security Awareness

Windows Prefetch directory.

Since Windows XP, the system caches pieces of applications information over an executable after it is run to speed up the future application load time. Using one of Eric Zimmerman's Tools you can see many more details than you think of.

How is this application called?

#forensics

Have you seen the Break The Glass Account or Break Glass Procedure somewhere in your organization?

"Break-glass access is granted through a dedicated break-glass account which is traditionally created in advance. The account is typically highly privileged and allows access to the most critical systems, like root accounts. For that reason, break-glass accounts are well monitored, documented, tested, and managed to avoid any misuse. "

https://www.ssh.com/academy/secrets-management/what-is-break-glass-access

#CyberEthical #ITSec

What is Break-Glass Access? | SSH

Break-glass access refers to an emergency procedure used when a user with insufficient access is granted elevated access rights to bypass normal controls.