Cockpit CMS and ExifTool Exploitation | TryHackMe CMSpit
Introduction In this video-walkthrough, we demonstrated Content management system exploitation, namely Cockpit, and privilege escalation on Exiftool….
Introduction In this video-walkthrough, we demonstrated Content management system exploitation, namely Cockpit, and privilege escalation on Exiftool….
Introduction In this video walkthrough, we covered manual and automatic methods to detect Server Side Template Injection…
Introduction In this video walk-through, we covered JSON Web Tokens and its associated vulnerabilities. In JWT, the…
Introduction In this video walk-through, we covered the last part of TryHackMe ZTH: Obscure Web Vulns room….
Introduction In this video walk-through, we covered SSRF or Server Side Request Forgery Vulnerability and how to…
Introduction In this video walk-through, we covered XXE or XML external entity vulnerability and how to find…
Introduction In this video walk-through, we covered some sysinternal tools from Microsoft that can be used to…
Introduction In this video walk-through, we covered managing logs in windows using event viewer, Powershell and windows…
Introduction This post on Threat Hunting with Sysmon in Security Operations on TryHackMe explains using Sysmon, a…
Premise In this video walk-through, we covered the basics of LFI vulnerability and how to perform a…
Introduction In this video walkthrough, we covered a pentest for an windows active directory machine where we…
Introduction In this video walkthrough, we demonstrated incident response and investigation using osquery on Windows and Linux…
In this video walkthrough, we covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about…
Premise In this video walk-through, we covered OWASP ZAP web application vulnerability scanner to perform vulnerability scanning…
In this video walkthrough, we covered disk analysis with Autopsy. We performed forensic analysis on the disk…
Overview: Focus areas include spear-phishing campaigns, encrypted traffic, unusual files, metadata analysis, and persistence mechanisms. The task…
Premise In this video walkthrough, we covered investigating malware / ransomware usb attacks with splunk to unleash…
Introduction In this post, we covered part 2 of using Splunk in a security operation center. We…
Premise In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe…
Premise The video is a technical walkthrough focused on using Splunk to investigate a ransomware attack scenario….