Wireshark Basics | Complete Guide | TryHackMe Wireshark The Basics & Packet Operations We covered a complete introduction to Wireshark, the packet analysis tool. We went over the main sections, capturing traffic, packet…
Complete Guide to BurpSuite Intruder | TryHackMe Junior Penetration Tester In this video walk-through, we covered BurpSuite Intruder, Comparer, Sequencer and Extender as part of TryHackMe Junior Penetration Tester…
Complete Guide & Tutorial To Brim | Packet Analysis and Investigation | TryHackMe We covered Brim which is an open source packet and log analyzer. Brim has powerful features that make it ideal for large packet capture…
BurpSuite : The Basics For Beginners | COMPTIA Pentest+ Course Preparation TryHackMe We covered the tools and techniques used to enumerate subdomains as part of TryHackMe SubDomain Enumeration room.
Cybersecurity Notes COMPTIA Pentest+ Study Notes | Cyber Security Notes This COMPTIA Pentest+ study guide bridges the gap between running a vulnerability scan and conducting a full engagement
Packet & Log Analysis with Zeek | TryHackMe Zeek P1 & P2 & P3 We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security monitoring, incident analysis and logs…
Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1 We covered process injection and process hollowing. Process injection is the process of injecting an already running process with malicious…
Microsoft Office Word Document Malware Analysis | HackTheBox Diagnostic We covered analyzing a sample Microsoft office word document using oletools to extract relevant Macros and links. The sample document…
Cyber Threat Intelligence Platforms | OpenCTI | TryHackMe We briefly talked about cyber threat intelligence, tools and platforms used and how threat data is ingested into these tools. We covered…
Understainding Windows OS Processes and Internals | TryHackMe Internals We covered basics of Windows internals including processes, virtual memory allocation, handles, DLLs, Portable executable header and other…
Command Injection Explained | OWASP TOP 10 | HackTheBox LoveTok We briefly explained command injection as one of the top 10 web application vulnerabilities. Command injection allows an attacker to…
Cleaning a Linux Infected Machine | HackTheBox PersistenceFutile We covered an incident response scenario from HackTheBox named PersistenceFutile where we went over an infected Linux machine and we were…