Task 1 Introduction In this room, we will cover the fundamentals of packet analysis with Wireshark and investigate the event of interest at the packet-level. Note that this is the second room of...
TryHackMe Wireshark: The Basics — Task 5 Packet Filtering & Task 6 Conclusion
If you haven’t done tasks 3 & 4 yet, here is the link to my write-up of them: Task 3 Packet Dissection & Task 4 Packet Navigation Getting The VM Started Starting at Task 1, you will see t...
TryHackMe Wireshark: The Basics — Task 3 Packet Dissection & Task 4 Packet Navigation
If you haven’t done tasks 1 & 2 yet, here is the link to my write-up of them: Task 1 Introduction & Task 2 Tool Overview Getting The VM Started Starting at Task 1, you will see the green ...
Did You Know You Could Run Linux Commands On Google’s Bard
Before I can go into how I discovered this, I want to lay out how I got there. The other day I was messing around on my Kali VM, trying to create a bash script to pull IPs from log files. Kept ge...
Starting points and advice for getting into Cyber Security
I was asked on LinkedIn by a recent connection, “What resources I have that I could share” and “Your roadmap of daily tasks maybe you have noted somewhere”. I thought about this, and how best to an...
TryHackMe Wireshark: The Basics —Task 1 Introduction & Task 2 Tool Overview
Getting The VM Started Starting at Task 1, you will see the green Start Machine button. Click this button to get the VM Started. Scroll to the top where the banner is. On the right side of the ...
TryHackMe Brim — Task 7 Exercise: Threat Hunting with Brim | Crypto Mining & Task 8 Conclusion
If you haven’t done task 6 yet, here is the link to my write-up of them:Task 6 Exercise: Threat Hunting with Brim Malware C2 Detection Getting the VM Started Click the green button, labeled Start...
TryHackMe Brim — Task 6 Exercise: Threat Hunting with Brim | Malware C2 Detection
If you haven’t done tasks 4 & 5 yet, here is the link to my write-up of them: TryHackMe Brim — Task 4 Default Queries & Task 5 Use Cases Getting the VM Started Click the green button, lab...
TryHackMe Brim — Task 4 Default Queries & Task 5 Use Cases
If you haven’t done tasks 1, 2, & 3 yet, here is the link to my write-up of them: Task 1 Introduction, Task 2 What is Brim?, & Task 3 The Basics. Getting the VM Started Click the green bu...
- TryHackMe Room — Summit
- TryHackMe Snort Challenge — The Basics — Task 1 Introduction, Task 2 Writing IDS Rules (HTTP), & Task 3 Writing IDS Rules (FTP)
- TryHackMe Room — Tactical Detection
- TryHackMe Snort — Task 9 Snort Rule Structure, Task 10 Snort2 Operation Logic: Points to Remember, & Task 11 Conclusion
- TryHackMe FixIt Room