PinnedElnur BadalovBuilding a Robust Cybersecurity Training Lab with Snort: A Step-by-Step GuideThis Lab is a specialized virtual environment designed for the purpose of cybersecurity training and education. NIDS&NIPS: SnortDec 17, 2023Dec 17, 2023
Elnur BadalovAlternative way to run Windows VM on Linux (Docker)As a Linux user, I often find the need to run software designed primarily for Windows or to test various Windows-specific applications.May 25May 25
Elnur BadalovTroubleshooting Touchscreen Issues in LinuxEncountering issues with your touchscreen after setting up Linux? Don’t worry, I’ve got you covered. In my case, the problem stemmed from…Mar 21Mar 21
Elnur BadalovDaily Bugle (Tryhackme CTF)TryHackMe | Daily Bugle Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking…Mar 19Mar 19
Elnur BadalovCreating a Secure VPN Connection using GRE Tunneling in Packet TracerIn this post you will learn how to create a VPN Connection using GRE Tunneling in Packet Tracer.Feb 28Feb 28
Elnur BadalovConfiguring SSH, Telnet and Tacacs+ in Packet TracerIn this brief post, I will demonstrate how to configure a router to be accessible via SSH, Telnet, and Tacacs+ in Packet Tracer. Firstly, I…Feb 25Feb 25
Elnur BadalovinSystem WeaknessSOC235 — Atlassian Confluence Broken Access Control 0-Day CVE-2023–22515Event ID: 197 Platform: LetsDefendJan 9Jan 9
Elnur BadalovinSystem WeaknessSOC227 — Microsoft SharePoint Server Elevation of Privilege — Possible CVE-2023–29357 ExploitationEvent ID: 189 Platform: LetsDefendJan 9Jan 9
Elnur BadalovinSystem WeaknessSOC175 — PowerShell Found in Requested URL — Possible CVE-2022–41082 ExploitationEvent ID: 125 Platform: LetsDefendJan 9Jan 9