TryHackMe: Enumeration & Brute Force Room Walkthrough
Overview
A detailed walkthrough of how to solve the ‘Investigating Web Attacks Challenge’ on Let’s Defend using the bWAPP web application as the victim.
As cybersecurity professionals, one of the key challenges we often face is the sheer volume of log data we need to analyze. Whether we’re hunting for anomali...
Table of Contents Introduction Understanding IPv6 DNS Takeover Mitigation Strategies Demonstration Steps Step 1: Setup NTLM Relay using L...
Introduction In this blog post, I discuss a common network attack called Link-Local Multicast Name Resolution (LLMNR) poisoning. This type of attack can be h...
Earning the INE Security Junior Penetration Tester (eJPT) certification has been a significant milestone in my cybersecurity journey. In this blog post, I’ll...
Room Link: https://app.hackthebox.com/starting-point?tier=0
Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a ...
Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
Step 1: Update Your System
Rooting the Academy Box: A Practical Ethical Hacking Walkthrough
A detailed walkthrough of how to exploit the Eternal Blue vulnerability on a Windows 7 Ultimate machine, covering both manual and automated methods.
Room Link: Task 2 Enumeration w/ Powerview
Introduction to Windows Event Logs and the tools to query them.
Room Link: https://tryhackme.com/r/room/wiresharkthebasics
Room Link: https://tryhackme.com/r/room/contentdiscovery
Room Link: https://app.hackthebox.com/starting-point?tier=0
Room Link: https://tryhackme.com/r/room/walkinganapplication
The Art of Reconnaissance: A Critical Tool in Cybersecurity
Room Link: https://tryhackme.com/r/room/introtooffensivesecurity
Vulnerability Scanning with Tenable Nessus
Configuring a DMZ Zone and Policy Using Palo Alto Firewall
Vulnerability Scanning with Nmap: Network Scanning What is Nmap and which problems does it solve in Cybersecurity? Nmap (Network Mapper) is a powerfu...
How to Configure DNS Settings in Microsoft Azure Lab Guide from Microsoft Learning
IAM: Configure Role-Based Access Control (RBAC) in Azure
IAM: Create Resource Manager Locks in Azure
IAM: Configure Azure Policy
Create Virtual Networks (VNets) in Azure
Learn to use Splunk for incident handling through interactive scenarios.
Room Link: https://tryhackme.com/room/splunk101
Vulnerability Scanning with OpenVAS: Unveiling Cybersecurity Insights
Room Link: https://tryhackme.com/r/room/defensivesecurity
Room Link: Windows Fundamentals 1 - TryHackMe Walkthrough
Implement Security Controls in AWS
Configure Network Monitoring in AWS
Enable Inter-VPC Connectivity with AWS Transit Gateway
Enable Inter-VPC Connectivity Using Peering Connections in AWS
AWS Networking: Multi-VPC Architecture
How to Deploy a Secured Static Website on AWS
Deploy an Amazon Connect Contact Center
Enable Session Stickiness Using an Application Load Balancer (ALB) in AWS
Deploy and Configure Azure Firewall and Rules to Allow/Deny Access to Certain Websites
Deploy Azure Application Gateway to Direct Web Traffic
Create Inbound NAT Rules to Connect to a Single VM in Azure (Port-Forwarding)
Configure Azure Load Balancer
Traffic Routing in Microsoft Azure with Network Virtual Appliacne (NVA)
Create a Site-to-Site (S2S) VPN Connection in Microsoft Azure
How to Create Point-to-Site VPN Connections in Microsoft Azure
How to Create VNet-to-VNet Connections in Microsoft Azure
Blog Post Title From First Header
You’ll find this post in your _posts directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different wa...
This theme supports link posts, made famous by John Gruber. To use, just add link: http://url-you-want-linked to the post’s YAML front matter and you’re done.
Only one thing is impossible for God: To find any sense in any copyright law on the planet. Mark Twain
A notice displays information that explains nearby content. Often used to call attention to a particular detail.
Abbott: Strange as it may seem, they give ball players nowadays very peculiar names.
All children, except one, grow up. They soon know that they will grow up, and the way Wendy knew was this. One day when she was two years old she was playing...
This post has been updated and should show a modified date if used in a layout.