WordPress XXE Vulnerability | CVE-2021–29447 TryHackMe We covered a wordpress XXE vulnerability CVE-2021–29447 that allows for sensitive files disclosure and server-side request forgery (SSRF)…
Firewall and IDS Evasion with NMAP | Practical Scenario We covered different types of Nmap scans that can be used to evade Firewall and IDS detection. We discussed packet fragmentation, decoy…
Event Analysis and Logs Parsing with Splunk | TryHackMe Fixit We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose…
How to Become a Red Team Hacker & Penetration Tester | Most FAQs Most Frequenty asked questions on How to Become Red Team Hacker & Penetration Tester answered by experts from Triber of Hackers.
Collecting and Analyzing Web Server Logs with Splunk | TryHackMe Splunk: Setting up a SOC Lab We explained the process of installing and configuring Splunk by showing the steps that involve choosing the role of Splunk whether it will…
Splunk Search Processing Language | TryHackMe Splunk: Exploring SPL We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types of functions used…
Dynamic Malware Analysis of Konni RAT Malware APT37 With Any.Run We covered an introduction to logging where we discussed the logic of creating logs and we analyzed Konni RAT Malware which was developed…
Introduction to Logging & Logs | TryHackMe Intro to Logs We covered an introduction to logging where we discussed the logic of creating logs and why we create logs. Logs are created and generated…
TryHackMe OWASP Top 10 Walkthrough 2021–2024 [Updated] In this post, we covered OWASP Top 10 using the material in TryHackMe OWASP Top 10 Room. You can find answers to the room’s questions below…
How to Scan and Clean an Infected WordPress With Malware We covered automated and manual methods of scanning and cleaning a WordPress website infected with different types of malware including…
Analyzing Cybersecurity Incidents with Zeek IDS | TryHackMe Zeek Exercises We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability using Zeek…