NLP with Naive Bayes’ Naive Bayes’ theorem is a statistical algorithm that is widely used in natural language processing (NLP) to perform classification tasks, such as sentiment analysis, text cat...
NLP-1: Logistic Regression
Natural Language Processing or NLP is a branch of artificial intelligence that enables machines to understand, interpret, and generate human language. With the growing volume of textual data availa...
Outlook CVE-2023-23397
CVE-2023-23397 On May 14th a new critical vulnerability (CVE-2023-23397) has been discovered in Microsoft Outlook. In this post I want to explain how this vulnerability works and how it can be e...
CySA+ Study Content
In this post I want to group all the content related with the CySA+ certification that I considere important and worth to keep in this site. I want to clarify that some important content may not be...
OSCP-9: Web-based Vulnerabilities
Chapter 9: Web-based Vulnerabilities In this chapter we will explain how to identify and exploit the most important web-based vulnerabilities. I won’t enter into a super deep explanation of all ...
Supervised Machine Learning: Regression and Classification
Supervised Machine Learning: Regression and Classification Machine learning is a field of study that gives computers the ability to learn without being explicitly programmed. Supervised vs. Unsup...
OSCP-8: Vulnerability Scanning
Chapter 8: Vulnerability Scanning Vulnerability Scanning is the process of detecting a known exploit/vulnerability when analyzing a victim. There are automated tools that do this process. They sc...
OSCP-7: Active Information Gathering
Chapter 7: Active Information Gathering In the previous post we explored some ways to obtain information about a user without directly interacting with him, but in this post we will explore the m...
OSCP-6: Passive Information Gathering
Chapter 6: Passive Information Gathering Depending on the pentest that you are doing, the first step may be gathering openly available information about the target without directly interacting wi...
HTB Timelapse Walktrough
Scan and Enumeration Let’s start doing a nmap scan. These are the results I obtained: Nmap scan report for 10.10.11.152 Host is up (0.11s latency). Not shown: 989 filtered tcp ports (no-response...