Investigate an Infected Machine with Splunk | TryHackMe Benign
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically process execution…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded to the…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs and Linux…
In this post, we covered part 4 of Windows Persistence Techniques and particularly we covered scheduled tasks as part…
In this post, We covered the second part of the TryHackMe CTF collection Vol.1 challenge where we performed some…
In this post, We covered most common Windows Privilege Escalation techniques as part of TryHackMe Windows Privesc room. During…
In this post, We covered the third part of Windows Persistence Techniques and specifically we covered Backdooring Windows Services…
Introduction In this post, We covered Cryptography and Steganography Challenges as part of TryHackMe CTF collection Vol.1 Part 3….
Introduction In this post, we covered important web components such as load balancers, CDNs, Web application firewalls, DNS Servers…
Introduction In this post, we covered the second part of Windows Persistence Techniques and specifically we covered Backdooring files…