Open in app

Sign in

Write

Sign in

Jay Vadhaiya
Jay Vadhaiya

112 Followers

Home

About

Published in

InfoSec Write-ups

·Sep 12

Introduction to Blue Teaming Operations

Blue Team Operations : Educational Series (Part-1) — Blue team operations are all about protecting computer systems, networks, and information from cyber threats. Think of it as a defense team that works to keep the bad guys out. They do this by watching for signs of attack, fixing weaknesses, and responding to security breaches. The blue team works…

Blue Team

7 min read

Introduction to Blue Teaming Operations
Introduction to Blue Teaming Operations
Blue Team

7 min read


Published in

InfoSec Write-ups

·Sep 7

Blue Team Operations : Educational Series

Enhancing Cyber Defense Proficiency through Comprehensive Blue Team Operations — Welcome to educational series of Blue Team Operations. In this series, we are going to explore different areas of Blue Teaming with some practical and theory base scenarios. I hope this series will help people who wants to start their career in Blue Team Operations. Here are list of topics…

Blue Team

6 min read

Blue Team Operations : Educational Series
Blue Team Operations : Educational Series
Blue Team

6 min read


Published in

InfoSec Write-ups

·Aug 15

Reverse Engineering: Injection Series Part 4 — Blue Team Labs

Reverse engineer the given file and understand the behavior. You can use any disassembler you like to complete this challenge. — Welcome to another blog on reverse engineering. In today’s blog we are going to walkthrough a challenge called “Injection Series Part 4”, hosted on Blue Team Labs. Let’s get started. Scenario: Reverse Engineer the given file and understand the behavior. You can use any disassembler you like to complete this…

Reverse Engineering

6 min read

Reverse Engineering: Injection Series Part 4 — Blue Team Labs
Reverse Engineering: Injection Series Part 4 — Blue Team Labs
Reverse Engineering

6 min read


Published in

InfoSec Write-ups

·May 19

Reverse Engineering a binary with IDA Free

Learn how to reverse engineer a basic level binary to get a password. — Greetings of the day everyone, in today’s blog post I am going to showcase how to use certain tools to analyze and reverse engineer a simple binary program to get a hidden password. Without further due, let’s get started. Introduction Reverse Engineering of a binary is a process of analyzing and…

Reverse Engineering

10 min read

Reverse Engineering a binary with IDA Free
Reverse Engineering a binary with IDA Free
Reverse Engineering

10 min read


Published in

InfoSec Write-ups

·Apr 15

Malicious Excel Document Malware Analysis

How an excel document can hack you in a seconds.. — Greetings of the day everyone, in this blog post we are going to analyze a malware sample based based on Microsoft Excel Document. Let’s have a closer look and take deep dive into analysis. I hope you will find it informative. Without any delay, let’s get started. Introduction LemonDuck is a…

Malware

14 min read

Malicious Excel Document Malware Analysis
Malicious Excel Document Malware Analysis
Malware

14 min read


Published in

InfoSec Write-ups

·Mar 8

Introduction to M4lw@r3 Analysis — What should you know ?

It is what it is, but what it is 😁 — It is been a while, I haven’t posted anything on medium. But today I am here with another amazing blog post on Malware Analysis. In this blog, we will see what does actually a Malware Analysis and how to get started a career in Malware Analysis. You can use below…

Malware

5 min read

Introduction to M4lw@r3 Analysis — What should you know ?
Introduction to M4lw@r3 Analysis — What should you know ?
Malware

5 min read


Published in

InfoSec Write-ups

·Feb 10

CyberVerse — Introducing a Cyber Security Community

Introduction to CyberVerse, A Cyber Security Community Discord Server Greetings of the day everyone. I am glad to announce that we have created a Cyber Security Community on discord. Our aim is to reach out as much as cyber professionals and cyber security enthusiasts and gather them at one place…

Infosec

7 min read

CyberVerse — Introducing a Cyber Security Community
CyberVerse — Introducing a Cyber Security Community
Infosec

7 min read


Published in

InfoSec Write-ups

·Dec 18, 2022

TCM Security “Academy” — Walkthrough

Walkthrough on TCM Security Academy machine challenge — Greetings of the day everyone. In today’s article we are going to walkthrough one of best machines of TCM Security Capstone Challenges from Practical Ethical Hacking Course. I am using VMWare Workstation as a hypervisor technology, Kali Linux as a attacking machine and academy vulnerable machine as a victim. Academy.7z TCM Security Academy Capstone Challenge Vulnerable Machine

Tcm Security

7 min read

TCM Security “Academy” — Walkthrough
TCM Security “Academy” — Walkthrough
Tcm Security

7 min read


Published in

InfoSec Write-ups

·Oct 24, 2022

Faster your NMAP scan with “Agile Grabber”

Make your scan faster in CTFs to save time on scanning. — Greetings of the day everyone. In today’s article we are going to go through one of my tools called “Agile Grabber”. Agile Grabber is multi cored and multi threaded tool made with python and nmap to faster the scan results. …

Nmap

4 min read

Faster your NMAP scan with “Agile Grabber”
Faster your NMAP scan with “Agile Grabber”
Nmap

4 min read


Published in

InfoSec Write-ups

·Sep 28, 2022

Understanding the NMAP methodology — Part 3

Understanding the NMAP methodology from beginner to advance Description : In today’s article, we will learn about Nmap’s more advanced network mapping techniques. If you haven’t read Part 1 and Part 2, I suggest you go through this article. This will be the last part of this series of Nmap. Before you…

Infosec

5 min read

Understanding the NMAP methodology — Part 3
Understanding the NMAP methodology — Part 3
Infosec

5 min read

Jay Vadhaiya

Jay Vadhaiya

112 Followers

Security Enthusiast | Blue Team Operations

Following
  • InfoSec Write-ups

    InfoSec Write-ups

  • Dr. Joseph Ikhalia (youtube.com/@realcyberdoctor)

    Dr. Joseph Ikhalia (youtube.com/@realcyberdoctor)

  • Himil

    Himil

  • Nikhil Godishela

    Nikhil Godishela

  • AnweshaGhosh

    AnweshaGhosh

See all (9)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams