[Introduction]
Follow me as we continuously learn and expand our view on the world of cyber security. We will be looking at attacking and compromising CTF Servers, implementations of Open Source security tools and breaking down attacks and analysing samples hands-on.
Welcome to Cyber-99
[*] – Tools & Projects
Exploring Open-Source tools to add to the tool belt, while creating projects showcasing some of these tools in action.

Perl IRC Bot – Technical Analysis
Captured from a honeypot, a technicial analysis into the operation of a Perl based IRC malware bot with the intention of destruction . Following through the steps of exploitation, deployment and infrastructure interaction. This analysis takes a look into the attack and its scope.
[*] – CTF Write Ups
Capture The Flag servers from HackTheBox, Vulnhub and TryHackMe are no doubt one of the best methods gaining skills and tools. Each CTF provides a safe secure environment to test skills from enumeration to compromising while capturing virtual flags hidden within the server.
THM – Wireshark
Work through Wireshark packet capture dumps to uncover the hidden pumpkins and answer a series of questions along the way.
Read MoreTHM – Crack The Hash
Learn to Identify different types of hashes and use online services and GPU based password cracker “HashCat” to crack passwords.
Read MoreTHM – Tomghost
Exploit a vulnerable Apache Tomcat server, work with PGP and escalate permissions to a complete takeover of the server.
Read More