Analyzing Cybersecurity Incidents with Zeek IDS | TryHackMe Zeek Exercises
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
We coverd firewall evasion tactics that are needed when conducting a red team engagement. Firewall Evasion tactics…
We covered the second part of Wireshark tutorials where we went over traffic analysis using advanced filters….
We covered a complete introduction to Wireshark, the packet analysis tool. We went over the main sections,…
In this video walk-through, we covered BurpSuite Intruder, Comparer, Sequencer and Extender as part of TryHackMe Junior…
We covered Brim which is an open source packet and log analyzer. Brim has powerful features that…