Introduction to Splunk For Cyber Security | TryHackMe Splunk 101
Premise: In this video walkthrough, we covered the basic functions in Splunk such as the apps and…
Premise: In this video walkthrough, we covered the basic functions in Splunk such as the apps and…
Premise In this video walkthrough, we covered the basics of Yara file pattern matching to analyze Malwares…
Premise In this video walkthrough, we covered the steps taken to perform a testing for the presence…
Premise In this video walkthrough, we covered the concept of fuzzing in computer programs and web applications….
Premise In this video walkthrough, we covered file upload vulnerabilities and some techniques to get around them….
Premise In this video walkthrough, we covered a vulnerability in Jackson library that uses JSON Deserialization and…
Premise In this video walkthrough, we covered conditional statements in Assembly and used Radare2 to analyze a…
Premise In this video walkthrough, we covered how website cookies work, the security threats, and security best…
Premise In this video walkthrough, we demonstrated common vulnerabilities in Lua programming including code injection, and performed…
Premise In this video walkthrough, I demonstrated the use of Openvas to scan for web application vulnerabilities….
Premise In this video walkthrough, I solved a CTF challenge designed to resemble OSCP Lab machines and…
Introduction (this write-up has been sent to google for evaluation and it’s copyrighted, so if you want…
Introduction This challenge write-up was one of the challenges administered by TrendMicro CTF 2017. These challenges require…
This write up is a bit old and contains the solution for both CTF 2013 Backdoor which…
This challenge requires skills both in exploit development, reverse engineering, and writing scripts using python. In this…
Although I could not catch up with the challenges at their time I like to practice the…