joshuanataninSystem WeaknessIncident Detection and ResponseAs a cyber consultant that has never been in a security operational team, I find it really difficult to understand how these processes…Jun 1, 2023Jun 1, 2023
joshuanatanHTB —KnifeHack the box (HTB) Knife machine walkthrough writeup using PHP 8.1.0-dev exploit and knife command exploitJul 25, 20211Jul 25, 20211
joshuanatanIncident Response — Cyberattack life cycle.Every cyberattack has a lifecycle. This is the process of the attacker in gaining access until they accomplish the attack objective.Feb 13, 2021Feb 13, 2021
joshuanatanIntroduction to Incident ResponseIncident response is one of the domain in the CSF that helps organization to ensure their readiness of incident handling and recoveryFeb 13, 2021Feb 13, 2021
joshuanatanRoot-Me Writeup — Remote File InclusionRemote file inclusion challenge writeup from Root Me PlatformDec 6, 20201Dec 6, 20201
joshuanatanRemote File Inclusion & Local File Inclusion (RFI & LFI)This article explains how to exploit RFI and LFI vulnerability in a web application, the differences between them, and the attack schemeDec 5, 2020Dec 5, 2020
joshuanatanRoot-Me Writeup — PHP EvalPHP Eval challenge writeup from the root me platformDec 4, 20201Dec 4, 20201
joshuanatanProgramming for Non-IT related Job Part 2How programming actually works to solve problem and how a programmer actually program a program to help their daily jobs.Dec 3, 2020Dec 3, 2020
joshuanatanProgramming for Non-IT Related JobComputer programming is a necessary skill you need to learn. It really helps you through repetitive tasks and makes you better than robotsDec 2, 2020Dec 2, 2020
joshuanataninThe StartupQuantitative Risk Assessment Using FAIRQuantifying risk using FAIR framework is a whole new risk assessment process you can get. It helps organization prioritze risk better.Nov 26, 2020Nov 26, 2020