Practical Purple Team | TryHackMe Atomic Bird Goes Purple #1 We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact of said emulation by…
NoSQL Injection For Beginners | TryHackMe NoSQL Injection We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed the two basic types of NoSQL…
Linux Ransomware Analysis with Ghidra & Any.Run We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we performed dynamic…
Complete Guide to Threat Emulation Using Caldera | TryHackMe CALDERA We covered threat emulation using Caldera which is a popular tool that can be used to emulate adversary and attacker’s behavious as well as…
Microsoft Windows Hardening P1 | Windows Security | TryHackMe We covered how to harden and secure Windows workstations from both the identity management and network side.This was part of TryHackme…
XOR Cryptography with Python | TryHackMe W1seGuy We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and encode the challenge flag. We used…
Security Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red Team We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a library of techniques mapped…
Threat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat Emulation We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing in addition…
DNS Tunneling Explained | TryHackMe DNS Data Exfiltration We covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS data exfiltration. This was part of…
Ransomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo Squatters We covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect machines with Windows installer…
Threat Hunting Case Study | The Strange Invoice | TryHackMe Hunt Me 1: Payment Collectors We covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine due to recent phishing…
Microsoft Cybersecurity Analyst Professional Certificate Review SC-900 The Microsoft Cybersecurity analyst from coursera covers the below courses: