Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1
We covered process injection and process hollowing. Process injection is the process of injecting an already running…
We covered process injection and process hollowing. Process injection is the process of injecting an already running…
We covered basics of the scripting language, Powershell, for penetration testers. We covered basic commands, scripting, enumerating…
We briefly talked about cyber threat intelligence, tools and platforms used and how threat data is ingested…
We covered basics of Windows internals including processes, virtual memory allocation, handles, DLLs, Portable executable header and…
We covered the second part of Windows OS forensics where we demonstrated gathering artifacts from the file…
We covered the process of conducting computer forensics under the context of examining a Windows operating system….
We covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can…
We covered the concept of network forensics and the use cases including network discovery, network troubleshooting, packet…
We covered network security protocols on the application layer, presentation layer and network layer of the OSI…
We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and…
We covered phishing attacks, how they work, components of a phishing email, components of phishing infrastructure, phishing…
We covered an introduction to YARA rules and how to create them to detect malwares using patterns…
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version…
We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as…
In this video walkthrough, we covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to…
We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption – Crypto 101…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from…
We covered a practical scenario on command injection using TryHackMe Epoch room. Challenge Description Be honest, you…