DNS Tunneling Explained | TryHackMe DNS Data Exfiltration We covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS data exfiltration. This was part of…
Ransomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo Squatters We covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect machines with Windows installer…
Threat Hunting Case Study | The Strange Invoice | TryHackMe Hunt Me 1: Payment Collectors We covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine due to recent phishing…
Microsoft Cybersecurity Analyst Professional Certificate Review SC-900 The Microsoft Cybersecurity analyst from coursera covers the below courses:
Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets We covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to…
Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough In this post, we covered the solution of Cyberseclabs potato where we demonstrated the exploitation of a vulnerable Jenkins server and the…
Android Reverse Engineering Basics | Part 1 | React Native Applications We covered the first part of Android applications reverse engineering basics where we discussed file format of Android applications, the…
Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to detect signs of…
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web application running on port 8000 where we…
Cybersecurity Notes Microsoft Cyber Security Analyst SC-900 Study Notes The SC-900 Study Notes and structured Microsoft Cyber Security Analyst Study guide provide a practical, exam-focused pathway for mastering the fundamentals required for the Microsoft SC-900 certification.
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks We covered Linux authentication logs, log files locations in Linux, Linux log analysis tools available in Linux and took a case study where…