The Pyramid of pain Explained | Threat Hunting | TryHackMe We covered The Pyramid of pain concept used in incident response and threat hunting which covers the artifacts of the attacker’s tools and…
Exploiting Pluck CMS and Linux Privilege Escalation | TryHackMe Dreaming We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version of Pluck…
Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a file upload…
Port Scanning and Information Gathering With Nmap and Nikto | TryHackMe Probe We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as Nmap and Nikto. We…
Bypassing File Upload Filters P5 | Upload Vulnerabilities TryHackMe We covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to exploit file upload vulnerabilities in…
Encyption and Cryptography 101 | TryHackMe Encryption — Crypto 101 We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption — Crypto 101 under complete beginner…
Incident Analysis with ELK Kibana | HTTP Logs Analysis | TryHackMe ItsyBitsy We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from a compromised Windows machine…
Redis NoSQL Database Exploit Using SSH | HackTheBox Postman We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of HackTheBox Postman
Introduction to Digital Forensics and Incident Response | TryHackMe DFIR We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part of TryHackMe DFIR.
Command Injection Practical Scenario | TryHackMe Epoch We covered a practical scenario on command injection using TryHackMe Epoch room.
Investigating an Infected Windows Active Directory | TryHackMe Recovering Active Directory We covered the process of incident response and the steps taken to investigate and recover an infected Windows active directory system. We…
Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20 We covered OverTheWire Natas 19–20 level. In this level, the web application used an if statement to verify if the user input contained…