Android Forensics | Mobile Forensics | HackTheBox Cat We covered the subject of Mobile forensics and briefly went over the scenario of data extraction from an Android backup. Android backups…
Network Security Protocols Explained | TryHackMe Security Engineer Track We covered network security protocols on the application layer, presentation layer and network layer of the OSI model. These protocols are…
Windows Privilege Escalation | Efs Potato | TryHackMe Stealth We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and services with Nmap and we found an…
Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was claimed to cause…
The Complete Guide to Phishing Attacks | TryHackMe We covered phishing attacks, how they work, components of a phishing email, components of phishing infrastructure, phishing assessment…
Yara Rules Explained | Complete Tutorial | TryHackMe Yara We covered an introduction to YARA rules and how to create them to detect malwares using patterns that match common indicators of…
PASTA Framework Explained | Threat Modeling | TryHackMe We covered the PASTA (Process for Attack Simulation and Threat Analysis) framework for risk assessment and threat modeling. We explained…
Decoding Radio SSTV and Audio Signals | Hardware Hacking P4 | HackTheBox Signals We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes. We had an audio file…
Hardware Hacking P2 | Logic Analyzers | HackTheBox Debugging Interface We covered another hardware hacking challenge where we demonstrated an analysis of an archived file that was created by capturing data off…
Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in…
Information Security Management Concepts Explained | TryHackMe We covered information security management concepts such as information security governance, information security regulations, risk…