Investigating FTP with Splunk | TryHackMe Boss of the SOC v2
Premise In this video, we covered FTP investigation using splunk search queries. We used data from TryHackMe…
Premise In this video, we covered FTP investigation using splunk search queries. We used data from TryHackMe…
Premise In this video walkthrough, we covered investigating malware / ransomware usb attacks with splunk to unleash…
Premise In this post, we covered part 2 of using Splunk in a security operation center. We…
Premise In this video walkthrough, we covered how to investigate web activity for users with Splunk. TryHackMe…
Premise In this video walkthrough, we covered how to investigate the Cerber Ransomware and find its related…
Premise In this video walkthrough, we covered how to hunt and identify advanced persistent threat with Splunk…
Premise: In this video walkthrough, we covered the basic functions in Splunk such as the apps and…
Premise In this video walkthrough, we covered the basics of Yara file pattern matching to analyze Malwares…
Premise In this video walkthrough, we covered the steps taken to perform a testing for the presence…
Premise In this video walkthrough, we covered the concept of fuzzing in computer programs and web applications….
Premise In this video walkthrough, we covered file upload vulnerabilities and some techniques to get around them….
Premise In this video walkthrough, we covered a vulnerability in Jackson library that uses JSON Deserialization and…
Premise In this video walkthrough, we covered conditional statements in Assembly and used Radare2 to analyze a…
Premise In this video walkthrough, we demonstrated common vulnerabilities in Lua programming including code injection, and performed…
Premise In this video walkthrough, I demonstrated the use of Openvas to scan for web application vulnerabilities….
Premise In this video walk-through, we demonstrated the exploitation process of the windows server attached to the…
Premise In this video walkthrough, I solved a CTF challenge designed to resemble OSCP Lab machines and…
Introduction (this write-up has been sent to google for evaluation and it’s copyrighted, so if you want…
Introduction This challenge write-up was one of the challenges administered by TrendMicro CTF 2017. These challenges require…
This write up is a bit old and contains the solution for both CTF 2013 Backdoor which…