Learn and practice log investigation, pcap analysis and threat hunting with Brim. Task 1 Introduction BRIM is an open-source desktop application that processes pcap files and logs files. Its pri...
TryHackMe Zeek Exercises — Task 3 Phishing, Task 4 Log4J, & Task 5 Conclusion
If you haven’t done task 1 & 2 yet, here is the link to my write-up of it: Task 1 Introduction & Task 2 Anomalous DNS. Getting the VM Started Click the green button labeled Start Machine,...
TryHackMe Zeek Exercises — Task 1 Introduction & Task 2 Anomalous DNS
Put your Zeek skills into practice and analyze network traffic. Task 1 Introduction The room invites you a challenge to investigate a series of traffic data and stop malicious activity under di...
TryHackMe Zeek — Task 7 Zeek Scripts | Scripts and Signatures, Task 8 Zeek Scripts | Frameworks, Task 9 Zeek Scripts | Packages, & Task 10 Conclusion
If you haven’t done task 4, 5, & 6 yet, here is the link to my write-up of it: Task 4 CLI Kung-Fu Recall: Processing Zeek Logs, Task 5 Zeek Signatures, & Task 6 Zeek Scripts Fundamentals. ...
TryHackMe Zeek — Task 4 CLI Kung-Fu Recall: Processing Zeek Logs, Task 5 Zeek Signatures, & Task 6 Zeek Scripts | Fundamentals
If you haven’t done task 1, 2, & 3 yet, here is the link to my write-up of it: Task 1 Introduction, Task 2 Network Security Monitoring and Zeek, & Task 3 Zeek Logs. Getting the VM Started ...
TryHackMe Zeek — Task 1 Introduction, Task 2 Network Security Monitoring and Zeek, & Task 3 Zeek Logs
Task 1 Introduction Introduction to hands-on network monitoring and threat detection with Zeek (formerly Bro). Zeek (formerly Bro) is an open-source and commercial network monitoring tool (traff...
TryHackMe NetworkMiner — Task 7 Exercises & Task 8 Conclusion
If you haven’t done Task 5 & 6 yet, here is the link to my write-up of it: Task 5 Tool Overview 2 & Task 6 Version Differences. Getting VM Started Go back to Task 1, at the top of the tas...
TryHackMe NetworkMiner — Task 5 Tool Overview 2 & Task 6 Version Differences
If you haven’t done Task 1 through Task 4 yet, here is the link to my write-up of it: TryHackMe NetworkMiner — Task 1 through Task 4 Getting VM Started Go back to Task 1, at the top of the task i...
TryHackMe NetworkMiner — Task 1 through Task 4
Learn how to use NetworkMiner to analyse recorded traffic files and practice network forensics activities. Task 1 Room Introduction NetworkMiner is an open-source traffic sniffer, pcap handler ...
TryHackMe Snort Challenge — Live Attacks Room
Put your snort skills into practice and defend against a live attack Task 1 Introduction The room invites you to a challenge where you will investigate a series of traffic data and stop malicious...
- TryHackMe Room — Summit
- TryHackMe Snort Challenge — The Basics — Task 1 Introduction, Task 2 Writing IDS Rules (HTTP), & Task 3 Writing IDS Rules (FTP)
- TryHackMe Room — Tactical Detection
- TryHackMe Snort — Task 9 Snort Rule Structure, Task 10 Snort2 Operation Logic: Points to Remember, & Task 11 Conclusion
- TryHackMe FixIt Room