Hi everyone,

Today, I am not with a VulnHub machine but with the HACKTHEBOX (HTB) machine called LAME.

I bought my HTB VIP subscription and started to workout on the retired machines at first. …


Even if you are very new to online investigation and if you don’t know anything about Maltego, you will be able to stalk any company after reading this 2-minute blog.

Here we are going to pick a target, and Maltego will search for all the email addresses it can find…


Today in this digital world, we have many technologies protecting our data. The use of passwords, authenticators, and cryptography are some of them. We have seen the importance of a strong password discussed in our previous article “Password Audits”. Passwords and authenticators are a level of security used to verify…


Passwords have become part of our daily lives. Passwords are extra protection to our personal and business data. They are often the first line of defense and, in many cases, the only line of defense against data breaches. …


It seems like new Cybersecurity breaches happen every day! with Data adding more and more value for your business, the higher the number of risks you have to carry day by day. In contempt of the growing need for affordable protection, powerful cybersecurity solutions are normally reserved for large-scale businesses…


Hello everyone,

Today, let us work out a new challenge Odin 1 — It is an easy Vulnhub challenge. Come let us see more about the challenge. As you have seen in our old blog Potato:1, we will be following the same PTES standards for this machine too.

You can…


Today, let us crack the Potato:1 Machine from Vulnhub.

You can download the machine from here.

  • Difficulty: Easy to Medium
  • Goal: Get to the root shell i.e.(root@localhost:~#) and then obtain flag under /root.

We will follow the Penetration Testing Execution Standards (PTES) for cracking the machine.

Let us start by…


ClearGRC

Why do organizations need it?

GRC framework is a federated structure which serves as central frame of reference/guide that directs, manages and implements GRC concepts in an organization. The framework is based on the organizational context and the GRC program is defined based on the framework.

A well designed GRC…


That is what an Integrated approach does

Every business entity is organized into different teams that are unique and specialized in a specific functional area to operate its business. These functional teams work together to meet their functional objectives by prioritizing their activities with a set of best practices, procedures…


We have heard this term for so long is it still relevant? Wait, what about IRM?

We have been hearing “GRC” which stands for Governance Risk and Compliance (some would argue that it stands for Governance Risk and Controls), ever since it was first mentioned in a research work by…

Clear InfoSec

Clear InfoSec is the subsidiary of Ana-Data Consulting Inc. that provides Information Security Services to help organizations improve their security posture.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store