Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow
We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part…
We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part…
We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine…
We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover…
Introduction We covered live forensics of a Linux workstation suspected of being infected with malware. We analyzed…
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…
We covered a very easy penetration testing challenge where we started with an Nmap scan followed by…
What is SOAR Security Orchestration, Automation, and Response (SOAR) platforms allow organizations to analyze threat intelligence efficiently,…
We covered using Snort to investigate and stop cyber attacks. This was part of the online lab…
We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was…
In this post , we covered Aurora endpoint and detection response agent tool that is used in…
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
In this post , we covered the concept of threat intelligence, how it’s performed and what are…
In this post , we covered an introduction to tactical detection where we used sigma rules to…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to…
In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to…
We covered and explained Wazuh as a SIEM and IDS/IPS solution along with its use case in…
We covered and explained Elastic stack that consists of Logstash, Elastic Search and Kibana. The three components…
We covered a wordpress XXE vulnerability CVE-2021-29447 that allows for sensitive files disclosure and server-side request forgery…