Nisha PExploiting EternalBlue (MS17–010): A Walkthrough and Protection MeasuresA detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated…Nov 3Nov 3
Nisha PinInfoSec Write-upsInvestigate Web Attacks Challenge (Let’s Defend)In this post, I’ll walk you through solving the “Investigate Web Attacks Challenge” from Let’s Defend. The challenge uses logs sourced from…Oct 20Oct 20
Nisha PinInfoSec Write-upsExploring Splunk Data Administration: Parsing, Event Line Breaking, and Data PrivacyAs cybersecurity professionals, one of the key challenges we often face is the sheer volume of log data we need to analyze. Whether we’re…Oct 14Oct 14
Nisha PinWomen in TechnologyMy Journey to eJPT Certification: Insights and Tips for SuccessEarning the INE Security Junior Penetration Tester (eJPT) certification has been a significant milestone in my cybersecurity journey. In…Aug 14Aug 14
Nisha PinWomen in TechnologyFlexing the Command Injection: A Peek into My Hack The Box NetMon ExploitWelcome to another exciting entry in my cybersecurity learning journey. As part of my 100 Days of Cybersecurity challenge, Day 32 brought…Dec 12, 2023Dec 12, 2023
Nisha PinWomen in TechnologyExploiting and Learning: A Dive into CVE-2008–4250 on Day 31 of My Cybersecurity JourneyIn this post, I’ll share my experience using Metasploit to compromise a vulnerable Windows XP machine, known as Legacy, on Hack the Box, by…Dec 10, 2023Dec 10, 2023
Nisha PinWomen in TechnologyConquering the ‘Source’ Room on TryHackMe: A Noteworthy AchievementOn the 28th day of my #100DaysOfCybersecurity journey, I accomplished a notable milestone by successfully navigating through the ‘Source’…Dec 2, 20231Dec 2, 20231
Nisha PBecoming Cyber-Savvy with Nmap on the Cybersecurity JourneyThe world of cybersecurity is an ever-evolving battlefield. With cybercriminals becoming more sophisticated, the need for robust defense…Nov 12, 2023Nov 12, 2023
Nisha PinWomen in TechnologyThe Essential Toolkit for Ethical Hacking: A Dive into Active ReconnaissanceCybersecurity is a field that demands continual learning and adaptability. As I venture through my #100DaysOfCybersecurity Challenge, I…Nov 12, 20231Nov 12, 20231
Nisha PinWomen in TechnologyThe Art of Reconnaissance: A Critical Tool in CybersecurityWelcome to Day 4 of my 100 Days of Cybersecurity Challenge. As I progress through this intensive learning journey, I’m thrilled to share…Nov 11, 2023Nov 11, 2023