Investigating Conti Ransomware on Microsoft Exchange with Splunk | TryHackMe
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used…
In this post, we covered SQL injection in search forms and performed Linux privilege escalation on the screen app….
In this post, we covered enumerating vulnerabilities in the DeVOps among which is the insecure file permissions. This was…
In this post, we covered investigating a compromised Windows machine with WMI Backdoors. This was part of TryHackMe Investigating…
In this post, we covered AWS cloud security enumeration such as bucket and container images enumeration. We used Lab…
Hunting viruses and malwares take more than static or dynamic analysis alone. Usually a combination of different techniques such…
OSINT stands for open source intelligence and it’s the collection and gathering of information using publicly available sources to…
In this post, we covered OWASP Top 10 using the material in TryHackMe OWASP Top 10 Room. You can…
We covered basic packet analysis with Wireshark. We used filters to go through packets. This was part of TryHackMe…
McDatabaseAdmin came rushing into the room and cried to McSkidy, “We’ve been locked out of the reindeer schedule –…