Investigating a Hacked Firewall | Checkpoint Security| LetsDefend SOC287 Case This post is a cybersecurity investigation tutorial focusing on analyzing a security alert related to a web exploitation attempt on a…
Ultimate Guide to Manual SQL Injection Testing | DVWA Training This post is a tutorial focused on explaining SQL Injection (SQLi) attacks using manual methods without relying on automated tools. The…
From Basic Enumeration to Root | TryHackMe Lookup In this post, we have a TryHackMe boot-to-root machine named lookup. In this machine, we go through the typical steps by starting with Nmap…
Nine Cybersecurity Metrics & KPIs to Track A PwC report revealed that only 22% of CEOs feel their risk exposure data is comprehensive enough to guide decision-making — a figure that…
TryHackMe Advent of Cyber 2024 Side Quest Writeup & Walkthrough This post is a detailed walkthrough of the TryHackMe Advent of Cyber 2024 Side Quest. In this post, I tried to provide detailed steps to…
Understanding Windows Core Processes For Cyber Security Analysts | TryHackMe This post discusses Windows core processes, essential for security analysts, forensic investigators, and incident responders to identify…
Real Time SOC Analyst Simulation| TryHackMe SOC Simulator | Phishing Unfolding This post introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities…
How Can XSS Be Used to Access Sensitive Files | TryHackMe The Sticker Shop The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site Scripting (XSS)…
TryHackMe Advent of Cyber 2024 Full Walkthrough Part 2 In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full Walkthrough starting from Day 7. You can find the…