TryHackMe: Enumeration & Brute Force Room Walkthrough
Overview
A detailed walkthrough of how to solve the ‘Investigating Web Attacks Challenge’ on Let’s Defend using the bWAPP web application as the victim.
As cybersecurity professionals, one of the key challenges we often face is the sheer volume of log data we need to analyze. Whether we’re hunting for anomali...
Table of Contents Introduction Understanding IPv6 DNS Takeover Mitigation Strategies Demonstration Steps Step 1: Setup NTLM Relay using L...
Introduction In this blog post, I discuss a common network attack called Link-Local Multicast Name Resolution (LLMNR) poisoning. This type of attack can be h...
Room Link: https://app.hackthebox.com/starting-point?tier=0
Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a ...
Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
Step 1: Update Your System
Rooting the Academy Box: A Practical Ethical Hacking Walkthrough
A detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated methods.
Room Link: Task 2 Enumeration w/ Powerview
Introduction to Windows Event Logs and the tools to query them.
Room Link: https://tryhackme.com/r/room/wiresharkthebasics
Room Link: https://tryhackme.com/r/room/contentdiscovery
Room Link: https://app.hackthebox.com/starting-point?tier=0
Room Link: https://tryhackme.com/r/room/walkinganapplication
The Art of Reconnaissance: A Critical Tool in Cybersecurity
Room Link: https://tryhackme.com/r/room/introtooffensivesecurity
Configuring a DMZ Zone and Policy Using Palo Alto Firewall
How to Configure DNS Settings in Microsoft Azure Lab Guide from Microsoft Learning
Learn to use Splunk for incident handling through interactive scenarios.
Room Link: https://tryhackme.com/room/splunk101
Room Link: https://tryhackme.com/r/room/defensivesecurity
Room Link: Windows Fundamentals 1 - TryHackMe Walkthrough
Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites
Deploy Azure Application Gateway to Direct Web Traffic
Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)
Configure Azure Load Balancer
Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)
Create a Site-to-Site (S2S) VPN Connection in Microsoft Azure
How to Create Point-to-Site VPN Connections in Microsoft Azure
How to Create VNet-to-VNet Connections in Microsoft Azure
This theme supports link posts, made famous by John Gruber. To use, just add link: http://url-you-want-linked to the post’s YAML front matter and you’re done.
Only one thing is impossible for God: To find any sense in any copyright law on the planet. Mark Twain
A notice displays information that explains nearby content. Often used to call attention to a particular detail.
Abbott: Strange as it may seem, they give ball players nowadays very peculiar names.
All children, except one, grow up. They soon know that they will grow up, and the way Wendy knew was this. One day when she was two years old she was playing...
This post has been updated and should show a modified date if used in a layout.
Room Link: https://tryhackme.com/r/room/wiresharkthebasics
Room Link: https://tryhackme.com/r/room/contentdiscovery
Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
A detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated methods.
As cybersecurity professionals, one of the key challenges we often face is the sheer volume of log data we need to analyze. Whether we’re hunting for anomali...
Earning the INE Security Junior Penetration Tester (eJPT) certification has been a significant milestone in my cybersecurity journey. In this blog post, I’ll...
You’ll find this post in your _posts directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different wa...
As cybersecurity professionals, one of the key challenges we often face is the sheer volume of log data we need to analyze. Whether we’re hunting for anomali...