How to Become a Red Team Hacker & Penetration Tester | Most FAQs Most Frequenty asked questions on How to Become Red Team Hacker & Penetration Tester answered by experts from Triber of Hackers.
Collecting and Analyzing Web Server Logs with Splunk | TryHackMe Splunk: Setting up a SOC Lab We explained the process of installing and configuring Splunk by showing the steps that involve choosing the role of Splunk whether it will…
Splunk Search Processing Language | TryHackMe Splunk: Exploring SPL We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types of functions used…
Dynamic Malware Analysis of Konni RAT Malware APT37 With Any.Run We covered an introduction to logging where we discussed the logic of creating logs and we analyzed Konni RAT Malware which was developed…
Introduction to Logging & Logs | TryHackMe Intro to Logs We covered an introduction to logging where we discussed the logic of creating logs and why we create logs. Logs are created and generated…
TryHackMe OWASP Top 10 Walkthrough 2021–2024 [Updated] In this post, we covered OWASP Top 10 using the material in TryHackMe OWASP Top 10 Room. You can find answers to the room’s questions below…
How to Scan and Clean an Infected WordPress With Malware We covered automated and manual methods of scanning and cleaning a WordPress website infected with different types of malware including…
Analyzing Cybersecurity Incidents with Zeek IDS | TryHackMe Zeek Exercises We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability using Zeek…
How to use TheHive | Security Incident Response Platform | TyrHackMe TheHive Project We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration and exchanging of…
Linux Privilege Escalation For Beginners | Nebula Exploit Exercises | Level 01–19 We covered the solution walkthrough of levels 01–19 of Nebula exploit exercises that let you practice your Linux privilege escalation…
BurpSuite Repeater, Sequencer & Encoder/Decoder | TryHackMe BurpSuite We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer…
Living Off The Land Binaries Explained | TryHackMe We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off The Land Binaries are applications and…