Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover threats and attacker’s…
Loki Locker Ransomware Detection | Windows Events Logs Analysis We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and from there we…
Linux Privilege Escalation | TryHackMe common priv esc We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt for threats…
Windows Privilege Escalation with Metasploit | TryHackMe CyberLens CTF We covered a very easy penetration testing challenge where we started with an Nmap scan followed by web enumeration then we found out a…
Investigating Cyber Attacks With Snort | TryHackMe Snort Challenge We covered using Snort to investigate and stop cyber attacks. This was part of the online lab room TryHackMe Snort Challenge — Live…
Basics of Network Traffic Analysis | TryHackMe Traffic Analysis Essentials We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was part of solving…
Aurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDR In this post , we covered Aurora endpoint and detection response agent tool that is used in detecting and responding to cyber security…
Demonstrating Black Box Penetration Testing | TryHackMe Relevant In this post, we covered a black box penetration testing challenge where we performed initial port scanning, found network shares from…
TryHackMe OWASP Juice Shop | The Complete Guide We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe. we will look at OWASP’s TOP 10…