Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover threats and attacker’s…
Loki Locker Ransomware Detection | Windows Events Logs Analysis We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and from there we…
Cybersecurity Notes Open Source Intelligence (OSINT) Study Notes in PDF The OSINT Study guide outlines structured methods for building resilient sock puppet accounts that withstand platform scrutiny.
Linux Privilege Escalation | TryHackMe common priv esc We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt for threats…
Windows Privilege Escalation with Metasploit | TryHackMe CyberLens CTF We covered a very easy penetration testing challenge where we started with an Nmap scan followed by web enumeration then we found out a…
Investigating Cyber Attacks With Snort | TryHackMe Snort Challenge We covered using Snort to investigate and stop cyber attacks. This was part of the online lab room TryHackMe Snort Challenge — Live…
Basics of Network Traffic Analysis | TryHackMe Traffic Analysis Essentials We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was part of solving…
Aurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDR In this post , we covered Aurora endpoint and detection response agent tool that is used in detecting and responding to cyber security…
Demonstrating Black Box Penetration Testing | TryHackMe Relevant In this post, we covered a black box penetration testing challenge where we performed initial port scanning, found network shares from…
TryHackMe OWASP Juice Shop | The Complete Guide We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe. we will look at OWASP’s TOP 10…