Analyzing HTTP and FTP Traffic with Snort | TryHackMe Snort Challenge – The Basics
We covered using Snort to analyze FTP and HTTP traffic by creating and configuring the appropriate rules….
We covered using Snort to analyze FTP and HTTP traffic by creating and configuring the appropriate rules….
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered the solution walkthrough of levels 01-19 of Nebula exploit exercises that let you practice your…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…
We covered the solution walkthrough of Basic pentesting 1 Vulnhub by introducing the basic steps and methodology…
We demonstrated the steps taken to perform penetration testing for Windows machine with Active Directory installed. We…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
We covered the solution walkthrough of Moria Vulnhub by analyzing Wireshark Pcap file to extract a series…
We covered the first part solution walkthrough of Cyberry Vulnhub lab where we demonstrated port knocking. In…
We covered the solution of The Ether: Evil Science Vulnhub free lab by demonstrating Remote Code Execution…
We covered the solution of G0rmint Vulnhub lab by applying log file poisoning in a website based…
Description In the race for Vitalium on Mars, the villainous Board of Arodor resorted to desperate measures,…
We covered the solution for Depth Vulnub lab and covered command injection in JSP or known as…
We covered the first part solution to D0not5top Vulnhub lab by using a combinations of active information…