PinnedCyberDefenders — DumpMeMemory Forensics Walkthrough Today I am going to complete a memory forensics challenge published in CyberDefenders. Scenario: One of the SOC analysts took a memory dump from a machine infected with a meterpreter malware. …Cyberdefenders6 min readCyberdefenders6 min read
Published inCryptoGen Nepal·Apr 28, 2021Certifications to Kickstart Your Cybersecurity CareerGetting into cyber security is difficult, particularly if you don’t have a guide to show you the way. In the other hand, certifications are highly valued in the information security industry, but it is debatable if this is the best way to find talent. There are several certifications available to…Security Certifications3 min readSecurity Certifications3 min read
Nov 26, 2020Chill Hack WalkthroughChill Hack.pdf Edit descriptiondrive.google.com1 min read1 min read
Sep 16, 2020Curl — A Command Line BrowserCurl is a simple command line utility that is used for transferring data to or from the server and for making different types of requests. It supports cookies, HTTP, HTTPS, LDAP, SMB and various other protocols which are commonly used. …Linux5 min readLinux5 min read