Complete Guide & Tutorial To Brim | Packet Analysis and Investigation | TryHackMe
We covered Brim which is an open source packet and log analyzer. Brim has powerful features that…
We covered Brim which is an open source packet and log analyzer. Brim has powerful features that…
We covered the basics of the Burp Suite web application security testing framework. Burp Suite is a…
We covered Apache proxy servers including forward and reverse proxy servers. We covered the related modules such…
We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security…
We covered the python pickle library and explained why it’s not secure any more. Additionally we demonstrated…
We covered the tools and techniques used to enumerate subdomains as part of TryHackMe SubDomain Enumeration room….
We demonstrated incident response and investigation using osquery on Windows and Linux endpoints. Overview Key Concepts 1….
We covered process injection and process hollowing. Process injection is the process of injecting an already running…
We covered basics of the scripting language, Powershell, for penetration testers. We covered basic commands, scripting, enumerating…
We covered analyzing a sample Microsoft office word document using oletools to extract relevant Macros and links….
We briefly talked about cyber threat intelligence, tools and platforms used and how threat data is ingested…
We covered basics of Windows internals including processes, virtual memory allocation, handles, DLLs, Portable executable header and…
We covered Server Side Template Injection vulnerability and demonstrated a practical scenario using HackTheBox Neonify web challenge….
We briefly explained command injection as one of the top 10 web application vulnerabilities. Command injection allows…
We covered an incident response scenario from HackTheBox named PersistenceIsFutile where we went over an infected Linux…
We covered the second part of Windows OS forensics where we demonstrated gathering artifacts from the file…
We covered the process of conducting computer forensics under the context of examining a Windows operating system….
We covered local file inclusion that is a web application vulenrability. We also covered the concept of…
We covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can…
We covered conducting memory forensics using Volatility framework. The scenario involved a memory dump file that assumingly…