T-Plaza, 6th Floor, Thika, Kenya
+254 703 412 771

Tag: Cyber Security

Do Your Business, We Secure

Simplifying Data Protection Compliance

The current business landscape is characterized by adoption of technology which has led to the creation and storage of vast amounts of personal data. Data breaches, cyber-attacks, and privacy violations are becoming commonplace, leading to devastating consequences for individuals and organizations. Data protection compliance is critical for businesses and organizations operating in Kenya, particularly in…
Read more

Sharing local files on a docker container

Have you heard about a docker container? If not please check out our blog and video to help you learn what they are and what they entail. In this blog we will dive deeper into docker containers where we will look at how to share local files on the containers we have created. Note that…
Read more

Introduction to docker containers

Hello everyone, welcome to another blog series. This time round we’ll be covering docker containers. We are going to be looking at what docker is, the technology stack behind it in comparison to virtualization, the major differences between an image and a container as well as how to push and pull an image from the…
Read more

Samba Shares Exploitation – Walkthrough

TryHackMe: Kenobi Written – June 14th, 2022 Hello there, Today we look at “Kenobi” on TryHackMe. You can find the link to the room here: https://tryhackme.com/room/vulnversity. For this room one can opt to use the attack box which is straightforward. However, you could also opt to use OpenVPN, in case you are not familiar with…
Read more

Setting up a phishing campaign with Gophish- Walkthrough

Hi everyone, welcome back to our blog, today we will be talking about Gophish as a tool for performing phishing campaigns. Before we begin be sure to check out our other blogs on our website :https://yelbridges.co.ke/category/tech-business/ . . . Introduction to Phishing It is often said that when it comes to security the weakest link…
Read more

Remote Procedure Call Runtime Remote Code Execution Vulnerability CVE-2022-26809

Every 2nd Tuesday of every month Microsoft releases security updates for its windows operating system, dubbed “Patch Tuesday”. And this past Tuesday, pun intended, the 12th of April 2022, a number of updates were released that should have you concerned. Here’s why Of the 128 vulnerability fixes released, a significant number (10) have a CVSS…
Read more

Attacking ICS Plant – Walkthrough

Hi everyone, welcome to our blog on attacking Industrial Control System (ICS) #1. Here is the link to this room: https://tryhackme.com/room/attackingics1 . We also have walkthroughs for eternal blue exploit or “Blue” as is referred to by try hack me and a privileges escalation walkthrough for the try hack me room vulnversity, the links to…
Read more

Mobile Banking fraud rising in Kenya 

The Kenyan financial sector has inevitably found itself unable to resist technological indulgence.  The wave of offering customer’s alternative channels has been largely driven by MPESA penetration across the county.  Banks, MFB, SACCOs, are offering digital channels that have laid a strong base for low cost banking and have extended banking services beyond the branch…
Read more

Linux Privilege Escalation – Walkthrough

Hello there, welcome to our walkthrough on the “Vulnversity” room from TryHackMe. Here is the link to the room: https://tryhackme.com/room/vulnversity. For this room one can opt to use the attack box which is straightforward, you could also opt to use OpenVPn, in case you are not familiar with how connect via OpenVPN, please visit https://tryhackme.com/room/openvpn.…
Read more

Eternal Blue Exploitation – Walkthrough

Many organization have this as an existing vulnerability on there network as most of the machines vulnerable to this exploit are running legacy systems or the users not comfortable migrating to the newer versions of windows, or the systems Admins are lazy to update the systems. But what is the risk of this? below is…
Read more

×

Powered by WhatsApp Chat

× WhatsApp Us...