Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…
We covered a very easy penetration testing challenge where we started with an Nmap scan followed by…
What is SOAR Security Orchestration, Automation, and Response (SOAR) platforms allow organizations to analyze threat intelligence efficiently,…
We covered using Snort to investigate and stop cyber attacks. This was part of the online lab…
We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was…
In this post , we covered Aurora endpoint and detection response agent tool that is used in…
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
In this post , we covered the concept of threat intelligence, how it’s performed and what are…
In this post , we covered an introduction to tactical detection where we used sigma rules to…
We covered the CVE-2023-41892 proof of concept that affected Craft CMS manually and with Metasploit framework. CVE-2023-41892…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered the walkthrough of HackTheBox Surveillance where we demonstrated the exploitation of the recent vulnerability CVE-2023-41892…
We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to…
In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to…
CTF Challenge Description: The challenge contains a php webproxy and a Tomcat server which has the Tomcat…
CTF Challenge Description: Hi there, thanks for testing my new notes app. I know it’s not done…
The map specified in the challenge statement is as follows. It signifies the location in which the…
We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and…
We covered a cyber incident response case study that involved a malicious PDF malware delivered through a…
What is Infection Monkey? The Infection Monkey is an open-source security tool for testing a data center’s…