Using SOC & Threat Intelligence in Cybersecurity | TryHackMe Threat Intelligence for SOC In this post , we covered the concept of threat intelligence, how it’s performed and what are the IOCs collected during threat…
Understanding Tactical Detection and Detection Engineering | TryHackMe Intro to Detection… In this post , we covered an introduction to tactical detection where we used sigma rules to build unified detection rules used across…
Craft CMS CVE-2023–41892 Vulnerability Exploitation | POC We covered the CVE-2023–41892 proof of concept that affected Craft CMS manually and with Metasploit framework. CVE-2023–41892 is a security…
Investigating a Hacked PhpMyAdmin Database With The Elastic Stack | TryHackMe Slingshot We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website, using the…
Ransomware Detection with Advanced Elastic Search Queries | TryHackMe Advanced ELK We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to extract number and date ranges…
Active Directory Penetration Testing | TryHackMe Breaching Active Directory In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to demonstrating the concepts of Active…
Insomni’hack 2024 CTF | The Quest The map specified in the challenge statement is as follows. It signifies the location in which the CTF is conducted. Each of the three red…
Blocking Facebook and Bittorrent With PaloAlto Networks Firewall We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and specifying the…
Pickle Rick CTF TryHackMe | The Absolute Beginner Pentesting We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which after enough enumeration we were able to…
Hard Disk Image Forensics and Analysis with Autopsy | TryHackMe | Computer Forensics We covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about the operating system and uses. This was part of…