Windows Privilege Escalation | Efs Potato | TryHackMe Stealth
We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and…
We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered phishing attacks, how they work, components of a phishing email, components of phishing infrastructure, phishing…
We covered an introduction to YARA rules and how to create them to detect malwares using patterns…
Nebula Level 06 Description The flag06 account credentials came from a legacy unix system.a To do this…
Nebula Level 04 Description This level requires you to read the token file, but the code restricts…
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version…
Nebula Level 05 Description Check the flag05 home directory. You are looking for weak directory permissions To…
Nebula Level 08 Description World readable files strike again. Check what that user was up to, and…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as…
In this video walkthrough, we covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to…
We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption – Crypto 101…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from…
We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of…
We covered a practical scenario on command injection using TryHackMe Epoch room. Challenge Description Be honest, you…
We covered another hardware hacking challenge from hackthebox where we analyzed an signal file captured using software-defined…
We covered the process of incident response and the steps taken to investigate and recover an infected…