Investigating a Hacked PhpMyAdmin Database With The Elastic Stack | TryHackMe Slingshot
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website,…
We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to…
In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to…
We covered and explained Wazuh as a SIEM and IDS/IPS solution along with its use case in…
We covered and explained Elastic stack that consists of Logstash, Elastic Search and Kibana. The three components…
We covered a wordpress XXE vulnerability CVE-2021-29447 that allows for sensitive files disclosure and server-side request forgery…
We covered using Snort to analyze FTP and HTTP traffic by creating and configuring the appropriate rules….
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…
We covered other components of BurpSuite such as BurpSuite Repeater, BurpSuite Sequencer, BurpSuite Encoder/Decoder & BurpSuite Comparer….
We covered Living Off The Land Binaries that are frequently used in red team engagements. Living Off…
We covered responding to cyber incident using Splunk to analyze the related events and uncover the attack…
We coverd firewall evasion tactics that are needed when conducting a red team engagement. Firewall Evasion tactics…
We covered the second part of Wireshark tutorials where we went over traffic analysis using advanced filters….
We covered a complete introduction to Wireshark, the packet analysis tool. We went over the main sections,…