Workshop SOC of the Future: Preparing for Emerging Threats and Technologies I recently had the privilege of conducting a workshop on the importance of being a purple teamer within a Security Operations Center (SOC) at the Moroccan Cybers Camp (MCC) organized by ENSA University Cadi Ayyad Marrakech Innovation City. The event, focused on "Cloud Security," aimed to bring together
Workshop Threat Hunting Workshop: Detection and Response Greetings, fellow cybersecurity enthusiasts! I recently had the privilege of conducting a captivating workshop on the significance of threat hunting at ENSIAS University's Mohammed V through their yearly Cyber event MCSC. My name is Omar Jellouli, and I go by the alias "Fr33s0ul" in the cybersecurity
Ai That path to Ai: #8 Hacking Ai with Adv machine learning Adversarial machine learning Adversarial machine learning exploits how artificial intelligence algorithms work to disrupt the conduct of artificial intelligence algorithms. In the past years, adversarial machine learning has become an active zone of research as the job of AI continues to grow in vast numbers of the applications we use.
Ai That path to Ai: #7 CNNs, RNNs, Feature eng ML / imputaxon Convolutional Neural Networks (CNNs) A Convolutional Neural Networks (CNNs) is a Deep Learning algorithm which can take in an input picture, appoint significance (learnable weights and biases) to different articles in the image and have the option to separate one from the other. The pre-processing required in a CNNs; it
Ai That path to Ai: #6 Dimensionality reduction / and ens learning to improve classifi... Dimensionality reduction is a set of machine learning-based indicative models. They are useful to execute data manipulation; it decreases the dimensionality of a dataset. It is instrumental in cases where the issue becomes intractable, and the quantity of variables increases, then dimensionality reduction leads to choosing significant variables. * Low variance
Ai That path to Ai: #5 Performance evaluation Now that we covered a fair amount of the components and instruments involving in the AI systems, it is the time to talk a little about performance evaluation and its importance. Performance evaluation is an essential step in a methodological operation. Because after finishing the whole machine learning model, testing
Ai That path to Ai: #4 ANN and Activation functions Artificial neural networks Artificial neural networks are one of the trending topics in nowadays, Applications based on this type of technology imitate the sophisticated functionality of the human brain, where neurons process information in parallel. Researchers have successfully proved the concept by creating prototypes and successful models, for example, pattern
Ai That path to Ai: #3 the others Unsupervised learning The distinction in unsupervised learning from supervised learning, as it may have surmised the data will not contain any labels, and the module should attempt prospects and learn without a teacher. Semi-supervised learning The semi-supervised learning algorithm is a combination of supervised learning and unsupervised. The algorithms run
Ai That path to Ai: #2 Supervised learning It is a type of machine learning algorithms that learns from a provided input/output data to predict an un-provided output from the same form of input data in training. Supervised learning is often in our daily life, for example, the algorithm that indicates how much time a driver will
Ai Featured That path to Ai: #1 Intro to the fancy normal science. Cybersecurity field grew so fast that now the industry needs many cybersecurity professionals to defend and patch issues in networks and web applications before cybercriminals attempt to do it. Still, thankfully we have nowadays a lot of conferences and many people working together to make the internet a better internet.
CTF YearOfTheRabbit | CTF write-up TryHackMe | Year of the RabbitTime to enter the warren…TryHackMe Hello everyone, Today's challenge is full of surprises and I would suggest you be patient while doing it, and make sure not to get into the rabbit holes, this challenge is made by MuirlandOracle. Hope you enjoy this
CTF dogcat | THM write-up Hello everyone, Today's CTF is very special made by Jammy a user in Tryhackme. Trust me even if this box is rated medium difficulty, You'll need to think a lot and be very patient. I guarantee you if you try hard in this challenge you'
CTF Local file inclusion | write-up Hello everyone, here's a quick write-up about LFI that I really recommend for people just starting in the field. It's created by a user called falconfeast feel free to visit his room. TryHackMe | Cyber Security TrainingAn online platform for learning and teaching cyber security, all through
CTF Attacktive Directory | THM write-up Hello world! today's challenge is very unique, we will go through the steps to exploit an active directory. The challenge is designed by a user called Sp00ky. in my opinion, anyone who wants to get close to active directory exploitation this is the one for you, the amount
CTF thecodcaper CTF | write-up Hello everyone, today's CTF is so impressive, not rated yet but from my little experience I can tell there's no easy or hard challenge, it's all about how out-of-the-box can you think. but no worries this one does have hints and the techniques are
CTF bebop | drone lovers CTF Hello everyone, Today's CTF is available at www.Tryhackme.com rated as an easy challenge so it won't be hard for someone just starting in the field, the concept is based on the Parrot Bebop drone and brings a huge inspiration of the memory of the
CTF Jack-of-All-Trades TryHackMe | write-up Hello everyone, today's machine is so fun to break, I enjoyed every step I practised, Jack-of-All-Trades CTF challenge box was created for the Securi-Tay conference run on the 28th of February, 2020 by the Hacksoc. Let's start with some enumeration! root@kali:~# nmap -sC -sV 10.
CTF BluePrint TryHackMe | write-up Hello everyone, today's challenge is really fun! rated as easy, and we get no hints or instruction, only one question as a note: "Do you have what is takes to hack into this Windows Machine?" ENUMERATION TIME root@kali:~# nmap -sC -sV 10.10.41.176
CTF Inclusion | CTF write-up today's CTF is really easy, and really recommend it for beginners to CTFs, let's go straight to it ENUMERATION! root@kali:~# nmap -sC -sV 10.10.94.6 Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-10 14:38 UTC Nmap scan report for ip-10-10-94-6.eu-west-1.
CTF CTFcollectionVol2 | write-up Hello everyone, today's CTF is the second part of a first one, it doesn't mean you need to do the first one to pass to the second. this CTF is rated as a medium when it comes to difficulty, but trust me it doesn't
CTF JockerCTF | write-up Hello world, I hope you are all well and safe home from the pandemic, today's challenge is a CTF by Tryhackme it's rated medium, but still it needs focus and trying the right techniques, or you'll just dive in a rabbit hole. Let'
CTF Kenobi | CTF write-up today's CTF we will cover a Kenobi made by www.tryhackme.com the theme of the machine is star-wars ... Let's enumerate this machine and see what we're dealing with root@kali:~# nmap -sC -sV 10.10.68.87 Starting Nmap 7.80 ( https://nmap.
CTF ToolsRus CTF | write-up Hello all, today's challenge is made by Tryhackme.com, it's a fun CTF ratted as easy, totally straight forward. Let's enumerate the machine root@kali:~# nmap -sC -sV 10.10.27.83 Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-03 13:36 UTC
CTF Retro | write-up Hello everyone, today's CTF is provided by tryhackme.com and made by Darkstar7471 it is a web server based on windows, before we start enumerating the machine we have to take in consideration the note we got, which is we won't get any response for any
CTF Pickle Rick CTF | write-up Hello again, today we'll cover another CTF made by Tryhackme.com such a cool box I enjoyed every second of it, I hope you do and let's start our challenge with some enumeration. <target-machine> it looks like we don't have much to