TCPDump Explained | Packet Analysis | TryHackMe TCPDump
This post is a tutorial on the basics of using TCPdump, a command-line packet capturing tool commonly…
This post is a tutorial on the basics of using TCPdump, a command-line packet capturing tool commonly…
Cybersecurity is an ongoing battle between ethical hackers (white hats) and malicious hackers (black hats). As cyber…
Ah, the holiday season is close again! You might not feel it yet, but way up north,…
It’s the eve of 30th November – McSkidy sits in her large office with a cup of…
The Domain Name System (DNS) makes it easier for us to connect with devices on the internet…
This post is part of a Cybersecurity 101 series and focuses on Linux shells, their types, features,…
This video continues with Buffer Overflow exercises as part of the Offensive Security Pathway. The focus is…
In this post, we have a TryHackMe boot-to-root machine named lookup. In this machine, we go through…
This post is a detailed walkthrough of the TryHackMe Advent of Cyber 2024 Side Quest. In this…
This post is a detailed walkthrough of the Wiggle CTF challenge on TryHackMe. The objective of this…
This post discusses Windows core processes, essential for security analysts, forensic investigators, and incident responders to identify…
This post introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities….
In this post walk-through, we covered the first part of obfuscation techniques and principles for signature and…
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full…
In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024…
We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post…
This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management framework. It…
As the cybersecurity landscape evolves, Security Operations Centers (SOCs) are critical in protecting organizations against sophisticated threats….
The post provides an in-depth walkthrough of exploiting and enumerating MySQL Services as part of a penetration…