Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided…
How To Become a Junior Security Analyst | TryHackMe Jr Security Analyst Intro We covered the role of Junior security operations center analyst, the responsibilities and the required skills and certifications. We also…
How to Become a Professional Blogger & YouTuber Alternate title: Creative steps to becoming a pro blogger
Incident Response in Cyber Security | Training Course In this video, we covered the incident response lifecycle with all its stages covered and explained. Incident response phases start with…
Free OSINT Mini Course | Learn OSINT in Under Two Hours In this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This mini course is a curated and tailored…
Pyramid of Pain in Cybersecurity Explained Practically | TryHackMe Summit We covered a newly-released challenge, named Summit, into the SOC level 1 track in TryHackMe. The challenge wraps blue teamers and red…
Wireless Vulnerabilities in Practice | WPS Pixie-Dust Attack Explained We covered one of the most popular wireless vulnerabilities, that is, WPS feature. Most wireless attacks that target this feature focus on…
Incident Response in Cyber Security | Identification & Scoping Phase | TryHackMe We covered the second phase of incident response, that is, identification & scoping or detection phase. In the detection phase, the SOC…
Linux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP Machine We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts and used…
How can stored XSS vulnerability lead to cookie stealing? We covered brief introduction to both types of cross site scripting vulnerability (XSS), reflected & stored xss, and demonstrated a…
Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification then…