Your ultimate destination for cybersecurity articles and writeups.
Our writeups and articles are designed to provide practical insights and actionable tips that you can use to enhance your cybersecurity knowledge and skills.
Whether you’re a cybersecurity professional looking to stay up-to-date with the latest trends, or a beginner looking to learn the basics, our website has something for everyone.
The website is being actively updated with the latest writeups and articles related to cybersecurity. We cover a wide range of topics, including network security, data protection, CTFs and more.
What Behind Security offers
We produce resources for anyone interested in cybersecurity.
Writeups
CTFs, or Capture the Flag competitions, are a form of cybersecurity competition that have gained significant popularity in recent years. We do provide detailed analysis of challenges and the solution that was used to solve it.
Articles
As our lives become increasingly dependent on technology, the risks associated with cyber threats are growing at an alarming rate. With that, Behind Security simplifies cybersecurity by writing articles that is made for everyone to understand better this area.
Most viewed content
CTF Toolkit
Having a well-equipped toolkit is essential for efficiently tackling the diverse challenges presented in a CTF competition. This toolkit might include tools for network analysis, cryptography, steganography, reverse engineering, and more.
Valley CTF Writeup
Valley CTF on TryHackMe covers essential cybersecurity topics such as confidential information exposure, PCAP analysis, reverse engineering of ELF executables, horizontal privilege escalation, Python module hijacking, and vertical privilege escalation.
Jeff CTF Writeup
The Jeff CTF on TryHackMe is a Capture The Flag challenge that spans various cybersecurity topics, ranging from basic enumeration to advanced web application exploits and privilege escalation, making it a highly recommended experience for those seeking to enhance their penetration testing skills.
Hawk CTF Writeup
Hawk CTF is a medium to hard difficulty machine, which provides excellent practice in pentesting Drupal. The exploitable H2 DBMS installation is also realistic as web-based SQL consoles (RavenDB etc.) are found in many environments. The OpenSSL decryption challenge increases the difficulty of this machine.
Logic and Cybersecurity
Discover the vital role of programming logic in fortifying digital defenses and explore real-world cases like the infamous Sony hack, showcasing the catastrophic impact of a data breach
Falafel CTF Writeup
The Falafel CTF, featured in Behind Security's Road to OSCP series, is explored in a detailed pentest report. The CTF, while not overly challenging, demands unique tricks and techniques for successful exploitation.
Help people circumvent censorship: operate a Snowflake proxy.
Behind Security believes that free speech is the key for individual freedom.
Snowflake is a system that allows people from all over the world to access censored websites and applications. Much like VPNs, the technology allows users to navigate around Internet censorship, ensuring that your online activities remain unnoticed by Internet censors. By cleverly disguising your Internet usage as regular video or voice calls, Snowflake provides a seamless and effective solution to circumvent restrictions and safeguard your online freedom.