Insomni’hack 2024 CTF | The Quest The map specified in the challenge statement is as follows. It signifies the location in which the CTF is conducted. Each of the three red…
Blocking Facebook and Bittorrent With PaloAlto Networks Firewall We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and specifying the…
Pickle Rick CTF TryHackMe | The Absolute Beginner Pentesting We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which after enough enumeration we were able to…
Hard Disk Image Forensics and Analysis with Autopsy | TryHackMe | Computer Forensics We covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about the operating system and uses. This was part of…
Memory Forensics with Volatility | PDF Malware Analysis with Any.Run | Cyber Incident Response We covered a cyber incident response case study that involved a malicious PDF malware delivered through a phishing email. The PDF malware…
Wazuh SIEM Explained | TryHackMe Creating Custom Wazuh Alerts We covered and explained Wazuh as a SIEM and IDS/IPS solution along with its use case in the cyber security area and its components such as…
Cybersecurity Notes Wazuh SIEM Study Notes The Wazuh Study Guide notes go far beyond simple installation commands and dive into performance engineering principles critical for stability.
Elastic Stack & Logstash Explained For Data Analytics & Cybersecurity | TryHackMe We covered and explained Elastic stack that consists of Logstash, Elastic Search and Kibana. The three components are used for data…
Open Source Intelligence Techniques | The case of Blackhat SEO | TryHackMe WebOSINT We covered another case of Open Source Intelligence where we used investigated a domain name using different open source intelligence…
Open Source Intelligence Reddit Case Study | TryHackMe Advent of Cyber We covered an Open source intelligence case study starting from a Reddit username all the way to geographic location. TryHackMe Advent of…
Open Source Intelligence Tools & Techniques Explained With Case Studies We briefly explained and discussed OSINT techniques and tools using practical scenarios that involve extracting public information from…