Hacking VOIP Web Applications | MagnusBilling | TryHackMe Billing Walkthrough This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
Disk Forensics In Cyber Security | NTFS Forensics | TryHackMe NTFS Analysis The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System) in Windows using forensic tools. It…
TryHackMe SAL1 Certification Complete Review & Walkthrough The SAL1 is an entry-level certification introduced by TryHackMe, aimed at individuals aspiring to become Security Operations Center (SOC)…
How Hackers Use Plain Images to Deliver Malware | Xworm Analysis with Any.Run This post provides an in-depth analysis of a recent cyber attack known as the StegoCampaign, where hackers used PDF and image files to…
Splunk Certified Cybersecurity Defense Analyst Study Notes — SPLK 5001 The SPLK-5001 study guide & notes is designed to prepare individuals for the Splunk Certified Cybersecurity Defense Analyst certification…
Real Time SOC Analysis & Training | TryHackMe SOC Simulator Introduction to Phishing The post covers real-time SOC (Security Operations Center) analysis with a focus on phishing detection and response using TryHackMe’s SOC…
TryHackMe Windows Fundamentals | Complete Walkthrough This comprehensive guide delves into the foundational aspects of the Windows operating system, as outlined in the TryHackMe Windows…
How Hackers Crack & Pirate Software Licenses Software piracy is a constant battle between developers and hackers. Companies invest millions in security measures, yet hackers often…
Windows Machine Hacked With CVE-2024–49138 | Letsdefend SOC335 | SOC Training In this post , we investigate a Windows machine that was compromised using a privilege escalation vulnerability (CVE-2024–49138). The…
AntiVirus Evasion & Bypass Study Notes in PDF Antivirus evasion is a critical aspect of cybersecurity, especially for ethical hackers and penetration testers aiming to assess an…