COMPTIA Pentest+ Study Notes | Cyber Security Notes COMPTIA PenTest+ is CompTIA’s intermediate-level offensive security cert. It’s meant for professionals who want to demonstrate their…
Packet & Log Analysis with Zeek | TryHackMe Zeek P1 & P2 & P3 We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security monitoring, incident analysis and logs…
Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1 We covered process injection and process hollowing. Process injection is the process of injecting an already running process with malicious…
Microsoft Office Word Document Malware Analysis | HackTheBox Diagnostic We covered analyzing a sample Microsoft office word document using oletools to extract relevant Macros and links. The sample document…
Cyber Threat Intelligence Platforms | OpenCTI | TryHackMe We briefly talked about cyber threat intelligence, tools and platforms used and how threat data is ingested into these tools. We covered…
Understainding Windows OS Processes and Internals | TryHackMe Internals We covered basics of Windows internals including processes, virtual memory allocation, handles, DLLs, Portable executable header and other…
Command Injection Explained | OWASP TOP 10 | HackTheBox LoveTok We briefly explained command injection as one of the top 10 web application vulnerabilities. Command injection allows an attacker to…
Cleaning a Linux Infected Machine | HackTheBox PersistenceFutile We covered an incident response scenario from HackTheBox named PersistenceFutile where we went over an infected Linux machine and we were…
Windows Forensics P2 | The File System | TryHackMe Cyber Defense We covered the second part of Windows OS forensics where we demonstrated gathering artifacts from the file system. We covered extracting…
Windows Forensics Part 1 | Registry Forensics | TryHackMe We covered the process of conducting computer forensics under the context of examining a Windows operating system. We explained what are…
Local File Inclusion & Log Poisoning Explained | HackTheBox Toxic We covered local file inclusion that is a web application vulenrability. We also covered the concept of log file posioning and how we can…
Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track We covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can have…