Investigate an Infected Machine with Splunk | TryHackMe Benign
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded to the…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs and Linux…
In this post, we covered HackTheBox Jerry as part of the beginner track in Hackthebox. We demonstrated the move…
In this post, we covered part 4 of Windows Persistence Techniques and particularly we covered scheduled tasks as part…
In this post, we covered the eternal blue exploit as part of HackTheBox Beginner Track. Machine Name : HackTheBox…
In this post, We covered the second part of the TryHackMe CTF collection Vol.1 challenge where we performed some…
In this post, We covered most common Windows Privilege Escalation techniques as part of TryHackMe Windows Privesc room. During…
In this post, We covered the third part of Windows Persistence Techniques and specifically we covered Backdooring Windows Services…
Introduction In this post, We covered Cryptography and Steganography Challenges as part of TryHackMe CTF collection Vol.1 Part 3….