Introduction to Digital Forensics and Incident Response | TryHackMe DFIR We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part of TryHackMe DFIR.
Command Injection Practical Scenario | TryHackMe Epoch We covered a practical scenario on command injection using TryHackMe Epoch room.
Investigating an Infected Windows Active Directory | TryHackMe Recovering Active Directory We covered the process of incident response and the steps taken to investigate and recover an infected Windows active directory system. We…
Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20 We covered OverTheWire Natas 19–20 level. In this level, the web application used an if statement to verify if the user input contained…
Cybersecurity Notes COMPTIA Security+ SY0–701 Study Notes | Cyber Security Notes A well-structured COMPTIA Security+ study guide, supported by focused COMPTIA Security+ notes, transforms that overload into clarity.
Malware Static Analysis | Part Three | TryHackMe Basic Static Analysis We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures. This was part of TryHackMe…
Windows Active Directory Hardening and Security | TryHackMe We covered some basic security and hardening techniques that can be implemented on Windows server systems with AD installed. We mainly used…
Cybersecurity Notes Metasploit Framework Study Notes | Cyber Security Notes This Metasploit study guide begins with core module architecture and gradually advances into payload generation using msfvenom
Cybersecurity Notes OSCP Certificate Study Notes | Cyber Security Notes he OSCP notes break down the Assume Breach scenario into a systematic, repeatable methodology.
Cybersecurity Notes The Reverse Shells and Red Team Scripts Notes | Cyber Security Within the reverse shell notes, multiple bind and reverse shell implementations are demonstrated using Netcat, Bash, Python, PowerShell, PHP
Cybersecurity Notes How to be anonymous and untraceable Instead, the How to be anonymous online notes strongly recommend Tails OS , a live system that runs from a USB device
Cybersecurity Notes Buffer Overflow Techniques | Methodology and Practical Notes Structured Buffer overflow notes combined with comprehensive Binary exploitation notes provide that foundation distilling more than 150 pages