SMB Protocol Explained | COMPTIA Pentest+ | TryHackMe Network Services.
We covered the SMB protocol and how it works. SMB is is a client-server communication protocol used…
We covered the SMB protocol and how it works. SMB is is a client-server communication protocol used…
The video is a tutorial on exploiting NFS (Network File System) vulnerabilities as part of the TryHackMe…
We covered a basic example of bypassing file upload filters by changing the extension. We used Burp…
We covered an introduction to web applications and how they can be accessed. We also covered types…
We covered again printer exploitation methods and this time we used a machine that has printer installed…
We covered a scenario of buffer overflow where a variable was declared as an unsigned integer and…
We covered a binary that has only PIE or Position Independent Executable enabled as a protection while…
We covered most cyber attacks that could hit operating systems. Authentication attacks, weak passwords, outdated software, malicious…
We covered a machine with a printer exposed to the public via port 80. The printer contained…
We demonstrated the weaponization phase of the red team engagement. We covered the scenarios in which a…
We covered configuring snort as an IDS/IPS open-source solution. Snort operates as sniffer, packet logger and IPS/IDS….
We covered a scenario of web application admin bypass by reverse engineering the PHP source code which…
We covered a scenario of a binary vulnerable to buffer overflow vulnerability. The binary has NX and…
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital…
We covered a printer exploitation scenario where we started with telnet protocol then we used SNMP to…
Introduction We covered an introduction to security operations center and how it works, what are the different…
Introduction We covered an introduction to Maltego for reconnaissance, information gathering and threat intelligence. We covered how…
Introduction We covered Recon-ng as a Reconnaissance framework that is used commonly by red teams during engagements….
Introduction to Splunk We covered the basic fundamentals of Splunk for beginners. We explored data collection through…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…