Red Team in Cyber Security | TryHackme Red Team Fundamentals Cybersecurity is an ongoing battle between ethical hackers (white hats) and malicious hackers (black hats). As cyber threats continue to…
DNS Protocol Explained | TryHackme DNS in Detail The Domain Name System (DNS) makes it easier for us to connect with devices on the internet without needing to memorize complicated…
Linux Shell Scripting Explained | TryHackme Linux Shells This post is part of a Cybersecurity 101 series and focuses on Linux shells, their types, features, and how to use Bash scripting for…
Medical Devices Vulnerable to Cyber Attacks Medical devices, including pacemakers, insulin pumps, and imaging systems, are increasingly interconnected within hospital networks and the…
Investigating a Hacked Firewall | Checkpoint Security| LetsDefend SOC287 Case This post is a cybersecurity investigation tutorial focusing on analyzing a security alert related to a web exploitation attempt on a…
Ultimate Guide to Manual SQL Injection Testing | DVWA Training This post is a tutorial focused on explaining SQL Injection (SQLi) attacks using manual methods without relying on automated tools. The…
From Basic Enumeration to Root | TryHackMe Lookup In this post, we have a TryHackMe boot-to-root machine named lookup. In this machine, we go through the typical steps by starting with Nmap…
Nine Cybersecurity Metrics & KPIs to Track A PwC report revealed that only 22% of CEOs feel their risk exposure data is comprehensive enough to guide decision-making — a figure that…
TryHackMe Advent of Cyber 2024 Side Quest Writeup & Walkthrough This post is a detailed walkthrough of the TryHackMe Advent of Cyber 2024 Side Quest. In this post, I tried to provide detailed steps to…
Understanding Windows Core Processes For Cyber Security Analysts | TryHackMe This post discusses Windows core processes, essential for security analysts, forensic investigators, and incident responders to identify…