Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting
We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover…
We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover…
We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and…
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…
We covered a very easy penetration testing challenge where we started with an Nmap scan followed by…
What is SOAR Security Orchestration, Automation, and Response (SOAR) platforms allow organizations to analyze threat intelligence efficiently,…
We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was…
In this post , we covered Aurora endpoint and detection response agent tool that is used in…
In this post , we covered the concept of threat intelligence, how it’s performed and what are…
In this post , we covered an introduction to tactical detection where we used sigma rules to…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered an introduction to logging where we discussed the logic of creating logs and we analyzed…
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered the solution walkthrough of levels 01-19 of Nebula exploit exercises that let you practice your…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…