The Pyramid of pain Explained | Threat Hunting | TryHackMe
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from…
We have explained the process of threat modeling and the related steps including scope definition, asset identification,…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from…
We covered configuring snort as an IDS/IPS open-source solution. Snort operates as sniffer, packet logger and IPS/IDS….
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital…
Introduction to Splunk We covered the basic fundamentals of Splunk for beginners. We explored data collection through…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs…
We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics…
Introduction We covered how to analyze and conduct network forensic on pcap files with Brim. we also…
Introduction In this video walk-through, we covered some sysinternal tools from Microsoft that can be used to…
Introduction In this video walk-through, we covered managing logs in windows using event viewer, Powershell and windows…
Introduction This post on Threat Hunting with Sysmon in Security Operations on TryHackMe explains using Sysmon, a…
Introduction In this video walkthrough, we demonstrated incident response and investigation using osquery on Windows and Linux…
In this video walkthrough, we covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about…
Introduction The video is a tutorial on using YARA for threat detection within a cybersecurity context, specifically…