Investigating an Infected Windows Active Directory | TryHackMe Recovering Active Directory
We covered the process of incident response and the steps taken to investigate and recover an infected…
We covered the process of incident response and the steps taken to investigate and recover an infected…
We covered the boot2root challenge Athena from TryHackMe. We scanned the machine with Nmap and discovered SMB…
We covered some basic security and hardening techniques that can be implemented on Windows server systems with…
We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures….
We covered the first part of Phishing Email Analysis with PhishTool. We demonstrated key areas to consider…
We covered the Print Nightmare Exploit from a defensive perspective where we performed an incident response and…
We covered hashing functions including MD5 and SHA256 in addition to public key infrastructure and SSL/TLS certificates….
A local privilege escalation (LPE) vulnerability in Windows was reported to Microsoft on September 9, 2022, by…
We covered two methods to escape docker containers including the method of mounting the full host file…
We covered secure network architecture design concepts such as VLANs, security zones, access control lists, DNS snooping…
We covered a boot to root machine where we started with an Nmap scan to discover several…
We covered vulnerability management, vulnerability scanning, vulnerability management frameworks and the lifecycle of a vulnerability management program…
We covered the fifth part of exploiting Docker containers. We discussed one of the popular methods of…
We covered a Docker container running a web server that is vulnerable to server side request forgery….
We demonstrated gaining root access to a docker container running a web server with an SQL database….
We covered risk management process and its components and frameworks. We explained the different steps taken to…
We covered and explained CVE-2023-4911 Looney Tunables that affects mostly all Linux distributions and allows an attacker…
We covered the PASTA (Process for Attack Simulation and Threat Analysis) framework for risk assessment and threat…
We covered the STRIDE framework developed by Microsoft for threat modeling. STRIDE framework categorizes threats into 6…
We covered the Microsoft DREAD risk assessment Framework. DREAD is used widely to assess risks and threats…