Introduction to Logging & Logs | TryHackMe Intro to Logs
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered automated and manual methods of scanning and cleaning a WordPress website infected with different types…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered the solution walkthrough of levels 01-19 of Nebula exploit exercises that let you practice your…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…
We covered the solution walkthrough of Basic pentesting 1 Vulnhub by introducing the basic steps and methodology…
We demonstrated the steps taken to perform penetration testing for Windows machine with Active Directory installed. We…