<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyb3r-0verwatch]]></title><description><![CDATA[Cyb3r-S3c provides free learning resources to assist aspiring IT/Cybersecurity professionals and those already in the IT/Cybersecurity fields.]]></description><link>https://www.cyb3r-0verwatch.com/blog</link><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 17:47:28 GMT</lastBuildDate><atom:link href="https://www.cyb3r-0verwatch.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Security Engineer's Guide: Translating Vulnerability Data for Executive Buy-In]]></title><link>https://www.cyb3r-0verwatch.com/post/security-engineer-s-guide-translating-vulnerability-data-for-executive-buy-in</link><guid isPermaLink="false">68a3a2f26aa481be49312ea0</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Mon, 23 Feb 2026 17:22:08 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_7edd17ae0f0941e0878d731505054c0d~mv2.png/v1/fit/w_1000,h_502,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Analytics - HTB]]></title><description><![CDATA[In this guide, I’ll walk you through every step of tackling HackTheBox’s Analytics vulnerable host, covering the full penetration testing process from initial reconnaissance to post-exploitation.]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-analytics-htb</link><guid isPermaLink="false">672c1293a77b027388b5d940</guid><category><![CDATA[HackTheBox]]></category><pubDate>Tue, 27 Jan 2026 16:30:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_fb3afd9b6c844e8b860869b02faeb1e0~mv2.png/v1/fit/w_624,h_349,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Lookup - TryHackMe]]></title><description><![CDATA[Welcome to another Cyb3r-S3c technical walkthrough. In this post, I'll be dissecting TryHackMe's Lookup vulnerable host, demonstrating a complete penetration testing methodology from initial reconnaissance through full system compromise.]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-lookup-tryhackme</link><guid isPermaLink="false">691611a098ab608cbd14978a</guid><category><![CDATA[TryHackMe]]></category><pubDate>Tue, 18 Nov 2025 22:56:13 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_9c539e9d5ed74f2aa0bfb4019aedcdda~mv2.png/v1/fit/w_729,h_408,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Compensating Controls: When Patching Isn't an Option]]></title><link>https://www.cyb3r-0verwatch.com/post/compensating-controls-when-patching-isn-t-an-option</link><guid isPermaLink="false">6894efc0d9d80408cb2473c4</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Fri, 14 Nov 2025 18:06:44 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_a6434422274a4a70b5f39750a8bec192~mv2.png/v1/fit/w_858,h_566,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Strategies for Effective Vulnerability Scanning]]></title><link>https://www.cyb3r-0verwatch.com/post/strategies-for-effective-vulnerability-scanning</link><guid isPermaLink="false">688ccae0ab67ad5c68ce916e</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Fri, 31 Oct 2025 21:01:23 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_ee1c77514491453eaaded8bfa3ce5d77~mv2.png/v1/fit/w_1000,h_559,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[From Scan to Strategy: A Complete Guide to Vulnerability Analysis]]></title><description><![CDATA[This comprehensive guide will walk you through the essential steps of vulnerability analysis, transforming raw scan data into actionable security intelligence.]]></description><link>https://www.cyb3r-0verwatch.com/post/from-scan-to-strategy-a-complete-guide-to-vulnerability-analysis</link><guid isPermaLink="false">688be2ff45ab709d6d05ff51</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Mon, 20 Oct 2025 21:21:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_d53b702998ac41d995766e4d2bd7da9e~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[CVSS vs. Reality: Developing Context-Aware Risk Scoring]]></title><link>https://www.cyb3r-0verwatch.com/post/cvss-vs-reality-developing-context-aware-risk-scoring</link><guid isPermaLink="false">688d2a727c0a990e555cfc8e</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Tue, 30 Sep 2025 17:50:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_d8cbfb3f11754fe1bb6897bf302e48d6~mv2.png/v1/fit/w_1000,h_504,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Cloud Vulnerability Management: AWS, Azure, and GCP Considerations]]></title><link>https://www.cyb3r-0verwatch.com/post/cloud-vulnerability-management-aws-azure-and-gcp-considerations</link><guid isPermaLink="false">6893ae2de597530529f1d6d9</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Mon, 22 Sep 2025 20:47:53 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_3f7e96b363194f48848a20e48568f5c2~mv2.png/v1/fit/w_969,h_561,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[The Art of False Positive Management in Vulnerability Assessments]]></title><link>https://www.cyb3r-0verwatch.com/post/the-art-of-false-positive-management-in-vulnerability-assessments</link><guid isPermaLink="false">688d36e37ae5e5096a9218f2</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Wed, 03 Sep 2025 14:24:19 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_e9fa681c9734411ba3d0005b1e250426~mv2.png/v1/fit/w_1000,h_565,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Active Reconnaissance Decoded: An Essential for Assessing a Target]]></title><description><![CDATA[In this blog post I will examine the methodologies underpinning active reconnaissance, emphasizing the strategic role it plays in the pentesting framework. I will examine some tools and techniques employed to engage target hosts effectively. ]]></description><link>https://www.cyb3r-0verwatch.com/post/active-reconnaissance-decoded-an-essential-for-assessing-a-target</link><guid isPermaLink="false">6769a3d9d361a658c70ba176</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Wed, 06 Aug 2025 20:22:23 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_8433e8e8927542c59a83003578c0344d~mv2.png/v1/fit/w_972,h_572,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Understanding Web Application Security Testing: A Guide to Protecting Your Digital Assets]]></title><link>https://www.cyb3r-0verwatch.com/post/understanding-web-application-security-testing-a-guide-to-protecting-your-digital-assets</link><guid isPermaLink="false">66aa6e4cdd046be8290361d4</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Thu, 31 Jul 2025 20:45:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_b0286a91f2414e1fad752e3952a53cc0~mv2.png/v1/fit/w_1000,h_550,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Assignment - OffSec PG]]></title><description><![CDATA[Hey all, I am Pragmat1c_0n3. In this blog post, I will be conducting a detailed walkthrough of the OffSec Proving Grounds Assignment host.]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-assignment-offsec-pg</link><guid isPermaLink="false">66955d96f0325f191cb051f0</guid><category><![CDATA[OffSec Proving Grounds]]></category><pubDate>Thu, 13 Mar 2025 19:27:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_d196cf37f75c4b1799077ca67566cd92~mv2.png/v1/fit/w_1000,h_617,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Nessus Essentials - Installation Made Simple: Scan Your Network Like a Pro for Beginners]]></title><description><![CDATA[In this blog post, I’ll explore the world of vulnerability scanning using Nessus Essentials.]]></description><link>https://www.cyb3r-0verwatch.com/post/nessus-essentials-installation-made-simple-scan-your-network-like-a-pro-for-beginners</link><guid isPermaLink="false">6776cfd0b2c91031914919e8</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Thu, 20 Feb 2025 19:33:24 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_35bc278532d3464d8c5490c4687ca263~mv2.png/v1/fit/w_650,h_363,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[ PenTesting - Basic Active Reconnaissance Cheat Sheet]]></title><description><![CDATA[Pentesting is a critical practice in cybersecurity involving simulated cyberattacks to uncover vulnerabilities in an organization IT space.]]></description><link>https://www.cyb3r-0verwatch.com/post/pentesting-basic-active-reconnaissance-cheat-sheet</link><guid isPermaLink="false">66c7790f84b40ef79c8fdd5b</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Tue, 04 Feb 2025 01:13:08 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_f0d67c7396a04646947c770114efe382~mv2.png/v1/fit/w_1000,h_627,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Squid - OffSec PG (ModerateMode)]]></title><description><![CDATA[In this blog post, I’ll be walking you through an alternative method to exploit the Squid vulnerable host from the OffSec Proving Grounds. ]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-squid-offsec-pg-moderatemode</link><guid isPermaLink="false">66bb70edebe93fc63d6b6db3</guid><category><![CDATA[OffSec Proving Grounds]]></category><pubDate>Fri, 03 Jan 2025 19:20:30 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_416a84c9297b40debb6f3045f2503b2a~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Squid - OffSec PG (EasyMode)]]></title><description><![CDATA[In this blog post, I’ll be walking you through an alternative method to exploit the Squid vulnerable host from the OffSec Proving Grounds. ]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-squid-offsec-pg-easymode</link><guid isPermaLink="false">66a803fe3ed3f4fbed7a64b2</guid><category><![CDATA[OffSec Proving Grounds]]></category><pubDate>Fri, 20 Dec 2024 18:37:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_d0bcc6d2936d484090333958b61ca403~mv2.png/v1/fit/w_1000,h_623,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[CrowdStrike Falcon: The Ultimate Guide to Deployment, Configuration, and Administration]]></title><link>https://www.cyb3r-0verwatch.com/post/crowdstrike-falcon-the-ultimate-guide-to-deployment-configuration-and-administration</link><guid isPermaLink="false">66b674e272755152e300b9ee</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Mon, 09 Dec 2024 21:26:13 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_d6041c8bf2cc4969b507a0428274f4c9~mv2.png/v1/fit/w_745,h_746,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Offensive-S3c: Helpdesk - OffSec PG]]></title><description><![CDATA[ This is a detailed walk-through of the OffSec Proving Grounds Helpdesk vulnerable host.]]></description><link>https://www.cyb3r-0verwatch.com/post/offensive-s3c-helpdesk-offsec-pg</link><guid isPermaLink="false">6691545bf9724d065d58977e</guid><category><![CDATA[OffSec Proving Grounds]]></category><pubDate>Mon, 18 Nov 2024 16:57:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_9c4957748e3047f88aa9c0d71300c34d~mv2.png/v1/fit/w_1000,h_621,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Active Directory Fundamentals: (Part 6: GPOs Demystified)]]></title><description><![CDATA[In this post I will shift my focus towards an equally important aspect: group policy objects (GPOs) and their significance within AD DS.]]></description><link>https://www.cyb3r-0verwatch.com/post/active-directory-fundamentals-part-6-gpos-demystified</link><guid isPermaLink="false">64c4213746158247faffeb75</guid><category><![CDATA[Information Technology]]></category><pubDate>Wed, 23 Oct 2024 19:37:10 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_a4c0b7732eb34e4cba6d5772b1478813~mv2.png/v1/fit/w_743,h_685,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item><item><title><![CDATA[Exploring the Power of Feroxbuster: A Versatile Web Fuzzer]]></title><description><![CDATA[The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.]]></description><link>https://www.cyb3r-0verwatch.com/post/exploring-the-power-of-feroxbuster-a-versatile-web-fuzzer</link><guid isPermaLink="false">668d83473bb8ae206c973066</guid><category><![CDATA[Cybersecurity]]></category><pubDate>Wed, 02 Oct 2024 16:29:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/d60539_26bf0a3d23ac4bfb89561948a41ac87b~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>pragmat1c0n3</dc:creator></item></channel></rss>