29 Followers
5 Following
140 Posts
Cybersecurity researcher. Former web dev. Sharing pentesting writeups, automation tips & privacy insights.
Bloghttps://medium.com/@thecybercraft
Storehttps://cybercraftstore.gumroad.com

Comprehensive Guide to iOS and Mac Security

"...Clear, practical, and rooted in real expertise"

Do you have your copy yet?
https://infosecpress.com/books/comprehensive-guide-to-ios-and-mac-security/

#mac #apple #malware #infosec #cybersecurity

Breaking into the Vulnerable Controler VM | VulNyx Writeup

Controler is a medium-level Windows machine. We start by enumerating the Kerberos account for initial access. By exploiting Active Directory replication rights, we extract the Domain Administrator’s password hash, gaining full administrative control.

https://thecybercraft.medium.com/vulnyx-controler-writeup-b9ada8e12fdd

#cybersecurity #infosec #hacking #pentest #writeup #ctf

If you need to browse the internet a bit more privately, send a message, or tweak some info, you should check out Tails OS. It runs off a USB stick and clears everything as soon as you unplug it.

#tails #privacy #anonymity

Don't feel discouraged, cyber security takes a lot of time and hands on practice. As long as you don't quit you'll be fine.

#cybersecurity #infosec #technology #learning #study #productivity

Apple markets itself as the most secure consumer platform. That reputation makes its users the easiest targets.

Most people trust the ecosystem blindly. They never configure FileVault properly, never think about what Pegasus-level spyware can do to a fully updated iPhone, and never question whether their iCloud backup undoes their encryption entirely.

"Comprehensive Guide to iOS and Mac Security" covers what Apple does not tell you. Biometric security, encryption, spyware defense, hardware-level protections introduced by Apple Silicon, startup process monitoring with tools like KnockKnock and BlockBlock, firewall management, and application hygiene — with hands-on exercises and real-world threat analysis, not just theory.

Whether you are a casual user wanting better privacy or a professional hardening your own devices, this is the resource that fills the gap.
https://infosecpress.com/books/comprehensive-guide-to-ios-and-mac-security/

#cybersecurity #infosec #technology #apple #ios #iphone #mac #ipad #malware #pegasus

Rest is part of the system!

Burnout is the #1 reason people quit their cert journey 3 months in. Schedule recovery the same way you schedule study.

The people who make it in this field aren't always the most talented.
They're the most organized and the most consistent.

What's one habit that's made the biggest difference in your cybersecurity growth? 👇

#InfoSec #CyberSecurity #CertPrep #OSCP #BlueTeam #RedTeam #Productivity #CareerGrowth #LearningInPublic

Apple devices are NOT secure by default!

The Comprehensive Guide to iOS and Mac Security covers zero-click exploit defense, macOS encryption, and monitoring tools for your entire Apple ecosystem.
https://hackersarise.thinkific.com/courses/mac-security?ref=2df1d6

#apple #cybersecurity #infosec #technology #malware #ios #ai

Radio Basics for Hackers from @hackers_arise is completed.

For a beginner like me, it was a very clear explanation.

#cybersecurity #infosec #sdr #radio

Recently, I wrote a write-up for the vulnerable machine from #VulNyx called Controler. It’s a medium-level #Windows machine. #Enumeration begins with the Kerberos account, which I use to gain initial system access. Through further Active Directory enumeration, I #exploit replication rights, ultimately extracting the Domain Administrator’s password hash and gaining full administrative control.

Solving this machine took me some time, but I learned a lot. I touched on new tools like #BloodHound, delved a bit deeper into Active Directory, and, in general, kept my #pentesting skills in check.

If you are starting in #cybersecurity, I would definitely recommend checking some VMs from VulNyx.

https://medium.com/@thecybercraft/vulnyx-controler-writeup-b9ada8e12fdd