joshuanataninSystem WeaknessIncident Detection and ResponseAs a cyber consultant that has never been in a security operational team, I find it really difficult to understand how these processes…7 min read·Jun 1, 2023----
joshuanatanHTB —KnifeHack the box (HTB) Knife machine walkthrough writeup using PHP 8.1.0-dev exploit and knife command exploit5 min read·Jul 25, 2021--1--1
joshuanatanIncident Response — Cyberattack life cycle.Every cyberattack has a lifecycle. This is the process of the attacker in gaining access until they accomplish the attack objective.4 min read·Feb 13, 2021----
joshuanatanIntroduction to Incident ResponseIncident response is one of the domain in the CSF that helps organization to ensure their readiness of incident handling and recovery3 min read·Feb 13, 2021----
joshuanatanRoot-Me Writeup — Remote File InclusionRemote file inclusion challenge writeup from Root Me Platform5 min read·Dec 6, 2020--1--1
joshuanatanRemote File Inclusion & Local File Inclusion (RFI & LFI)This article explains how to exploit RFI and LFI vulnerability in a web application, the differences between them, and the attack scheme10 min read·Dec 5, 2020----
joshuanatanRoot-Me Writeup — PHP EvalPHP Eval challenge writeup from the root me platform7 min read·Dec 4, 2020----
joshuanatanProgramming for Non-IT related Job Part 2How programming actually works to solve problem and how a programmer actually program a program to help their daily jobs.6 min read·Dec 3, 2020----
joshuanatanProgramming for Non-IT Related JobComputer programming is a necessary skill you need to learn. It really helps you through repetitive tasks and makes you better than robots5 min read·Dec 2, 2020----
joshuanataninThe StartupQuantitative Risk Assessment Using FAIRQuantifying risk using FAIR framework is a whole new risk assessment process you can get. It helps organization prioritze risk better.6 min read·Nov 26, 2020----