Esther MatutMar 291 minCelebrating Women in CybersecurityPolito would like to share resources aimed at women who are in cybersecurity or who are interested in getting into this amazing field.
Ronny Thammasathiti & James KellyOct 26, 202312 minHow to Build Your Own DNS Sinkhole and DNS Logs Monitoring SystemPi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
Esther MatutAug 16, 20238 minIntroduction to Proving GroundsThe Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms
Erica ZelicJul 25, 20235 minPlaying with Bubbles: An Introduction to DLL-Sideloading DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta