Linux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP Machine We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts and used…
How can stored XSS vulnerability lead to cookie stealing? We covered brief introduction to both types of cross site scripting vulnerability (XSS), reflected & stored xss, and demonstrated a…
Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification then…
Practical Purple Team | TryHackMe Atomic Bird Goes Purple #1 We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact of said emulation by…
NoSQL Injection For Beginners | TryHackMe NoSQL Injection We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed the two basic types of NoSQL…
Linux Ransomware Analysis with Ghidra & Any.Run We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we performed dynamic…
Complete Guide to Threat Emulation Using Caldera | TryHackMe CALDERA We covered threat emulation using Caldera which is a popular tool that can be used to emulate adversary and attacker’s behavious as well as…
Microsoft Windows Hardening P1 | Windows Security | TryHackMe We covered how to harden and secure Windows workstations from both the identity management and network side.This was part of TryHackme…
XOR Cryptography with Python | TryHackMe W1seGuy We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and encode the challenge flag. We used…
Security Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red Team We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a library of techniques mapped…
Threat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat Emulation We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing in addition…