Ever wondered how tools like Jira or Linear manage their boards? Here's a fun UI challenge, making a Kanban board. I'll try walking you through how to build a simple Kanban board from scratch — explained as easy as possible.
In this article, we'll be taking a look at a few things that are bound to open your mind to really interesting concepts in cyberlaw. For instance, coming from a technical background, did you know that a computer isn't just defined as something that you use to work on assignments??!! Is your mind blown? I know right!! Then, we'll be taking a look at what exactly do the Criminal Code Laws cover in terms of Computer Crimes. Finally, we'll analyse a real life case study where all these concepts and criminal codes come into play.
In this article, I'll walk you through how to use Mimikatz to obtain user passwords from a Windows machine. I'll also show you how to use Mimikatz in order to perform an attack called passing the hash (pth) to escalate your privileges and impersonate a user. Also as a bonus, I'll show you how you can utilise both a Meterpreter reverse shell and a phishing attack in order to get the same outcome but without needing physical access to the target's machine.
A collection of helpful tools and links to help you on your CTF journey.