From Basic Enumeration to Root | TryHackMe Lookup
In this post, we have a TryHackMe boot-to-root machine named lookup. In this machine, we go through…
In this post, we have a TryHackMe boot-to-root machine named lookup. In this machine, we go through…
Introduction This post is a detailed walkthrough of a simulated cybersecurity incident investigation in a Security Operations…
A PwC report revealed that only 22% of CEOs feel their risk exposure data is comprehensive enough…
This post is a detailed walkthrough of the TryHackMe Advent of Cyber 2024 Side Quest. In this…
This post is a detailed walkthrough of the Wiggle CTF challenge on TryHackMe. The objective of this…
This post discusses Windows core processes, essential for security analysts, forensic investigators, and incident responders to identify…
This post introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities….
Introduction In this post, I presented a roadmap for beginners and advanced professionals in cyber security. This…
In this post walk-through, we covered the first part of obfuscation techniques and principles for signature and…
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full…
Introduction Two prominent certifications for established blue teamers are the Certified Defensive Security Analyst (CDSA) and Blue…
Introduction The CompTIA Security+ certification is a globally recognized credential that validates foundational skills in cybersecurity. Achieving…
In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024…
We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post…
Introduction Two popular options for individuals at the beginning or intermediate stages of their cybersecurity journey are…
This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management framework. It…
For aspiring cybersecurity professionals, hands-on experience is a crucial stepping stone to mastering the field. Hack The…
As the cybersecurity landscape evolves, Security Operations Centers (SOCs) are critical in protecting organizations against sophisticated threats….
Introduction The cybersecurity landscape offers several certifications for professionals aiming to validate their penetration testing skills. Among…