Cybersecurity Blog - Find writeups, tutorials and more
Welcome to CyberGoat, a website made for collaborating cybersecurity related topics.
Find a collection of walkthroughs for various CTFs, learn about the art of ethical hacking and understand cybersecurity concepts.
Explore some of the most recent articles here:
Pi + IDS = Security Monitoring
An effective security monitoring system using a Pi. Similar concept applies for any sized organisation with better hardware and more complex network, so scale as you wish.
Designing a Malware Lab
This article will outline how I have designed an isolated network / lab for malware analysis. You will find the following sections in this article:
Chill Hack - TryHackMe Walkthrough
Chill Hack - “This room provides the real world pentesting challenges. Easy level CTF. Capture the flags and have fun!” This is a TryHackMe box. To access this you must sign up to https://tryhackme.com/.
Malware Analysis - Overview (Part 1)
This article is part of the malware analysis series. This document will take a look at the basics and fundamental understanding of malware for analysis. Here is what you can expect from each part: