Windows Forensics P2 | The File System | TryHackMe Cyber Defense We covered the second part of Windows OS forensics where we demonstrated gathering artifacts from the file system. We covered extracting…
Windows Forensics Part 1 | Registry Forensics | TryHackMe We covered the process of conducting computer forensics under the context of examining a Windows operating system. We explained what are…
Local File Inclusion & Log Poisoning Explained | HackTheBox Toxic We covered local file inclusion that is a web application vulenrability. We also covered the concept of log file posioning and how we can…
Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track We covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can have…
Android Forensics | Mobile Forensics | HackTheBox Cat We covered the subject of Mobile forensics and briefly went over the scenario of data extraction from an Android backup. Android backups…
Network Security Protocols Explained | TryHackMe Security Engineer Track We covered network security protocols on the application layer, presentation layer and network layer of the OSI model. These protocols are…
Windows Privilege Escalation | Efs Potato | TryHackMe Stealth We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and services with Nmap and we found an…
Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was claimed to cause…
The Complete Guide to Phishing Attacks | TryHackMe We covered phishing attacks, how they work, components of a phishing email, components of phishing infrastructure, phishing assessment…
Yara Rules Explained | Complete Tutorial | TryHackMe Yara We covered an introduction to YARA rules and how to create them to detect malwares using patterns that match common indicators of…
PASTA Framework Explained | Threat Modeling | TryHackMe We covered the PASTA (Process for Attack Simulation and Threat Analysis) framework for risk assessment and threat modeling. We explained…