Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

40 total results found

XSS - Merry XSSMas

Advent of Cyber 2025

Day 11 Learn about types of XSS vulnerabilities and how to prevent them.

SOC Alert Triaging - Tinsel Triage

Advent of Cyber 2025

Day 10 Investigate and triage alerts through Microsoft Sentinel.

YARA Rules - YARA mean one!

Advent of Cyber 2025

Day 13 Learn how YARA rules can be used to detect anomalies.

Phishing - Phishmas Greetings

Advent of Cyber 2025

Day 12 Learn how to spot phishing emails from Malhare's Eggsploit Bunnies sent to TBFC users.

Containers - DoorDasher's Demise

Advent of Cyber 2025

Day 14 Continue your Advent of Cyber journey and learn about container security.

ICS/Modbus - Claus for Concern

Advent of Cyber 2025

Day 19 Learn to identify and exploit weaknesses in ICS systems.

Obfuscation - The Egg Shell File

Advent of Cyber 2025

Day 18 McSkidy keeps her focus on a particular alert that caught her interest: an email posing as northpole-hr.

CyberChef - Hoperation Save McSkidy

Advent of Cyber 2025

Day 17 The story continues, and the elves mount a rescue and will try to breach the Quantum Fortress's defenses and free McSkidy.

Forensics - Registry Furensics

Advent of Cyber 2025

Day 16 Learn what the Windows Registry is and how to investigate it.

Web Attack Forensics - Drone Alone

Advent of Cyber 2025

Day 15 Explore web attack forensics using Splunk.

Race Conditions - Toy to The World

Advent of Cyber 2025

Day 20 Learn how to exploit a race condition attack to oversell the limited-edition SleighToy.

Malware Analysis - Malhare.exe

Advent of Cyber 2025

Day 21 Learn about malware analysis and forensics.

C2 Detection - Command & Carol

Advent of Cyber 2025

Day 22 Explore how to analyze a large PCAP and extract valuable information.

AWS Security - S3cret Santa

Advent of Cyber 2025

Day 23 Learn the basics of AWS enumeration.

Exploitation with cURL - Hoperation Eggsploit

Advent of Cyber 2025

Day 24 The evil Easter bunnies operate a web control panel that holds the wormhole open. Using cURL, identify the endpoints, send the required requests, and shut the wormhole once and for all.

Side Quests

Advent of Cyber 2025

Introduction to WebHacking

Junior Penetration Tester

Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.

BurpSuite

Junior Penetration Tester

Burp Suite is the industry standard tool for web application hacking, and is essential in any web penetration test.