Cyber Security

After hours, Cyber Security November 10, 2021 0

MySQL Error “file too short” when creating sys_exec function

I’ve recently encountered an interesting error “file too short” when escalating privileges on a Linux box via MySQL Library (lib_mysqludf_sys_64.so). Turned…

Read More
Cyber Security March 31, 2021 0

Finding vulnerabilities with Windows Exploit Suggester – NG

Windows Exploit Suggester NG (WES-NG) is a tool based on the output of Windows’ systeminfo utility which provides the list of…

Read More
Cloud, Cyber Security January 13, 2020 0

Connecting to AWS EC2 instance using SSH over AWS SSM

It is very common that enterprise security policies don’t allow direct connections from corporate networks to EC2 instances over SSH. A…

Cyber Security March 1, 2018 0

Installing Sophos UTM 9 Firewall In Home Network

Have you ever thought about securing and monitoring your home network, or protecting your children from online threat? There are hundreds…

Cyber Security December 14, 2017 0

Securing Home Network with SOPHOS UTM IDS

Traditionally, households are connected to the internet via modems. Modern modems come with builtin basic routers and Wi-Fi access points. All…

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close