HTB Sherlock Labs
Rooms Brutus Sherlock Scenario In this very easy Sherlock, you will familiarize yourself with Unix auth.log and wtmp logs. We’ll explore a scenario where a Confluence server was brute-forced via i...
Rooms Brutus Sherlock Scenario In this very easy Sherlock, you will familiarize yourself with Unix auth.log and wtmp logs. We’ll explore a scenario where a Confluence server was brute-forced via i...
I participated in the Pico CTF 2025 online over 72 hours. I played with my univerersity peers on MQCyberSec Trojans team and we placed 185th out of 10460 teams. Web WebSockfish Challenge Can you ...
🧱 Lab Architecture Designed and built a self-hosted cybersecurity homelab replicating a real-life enterprise environment to gain hands-on experience in both offensive and defensive security operat...