Phishing Basics (TryHackMe)
Introduction Imagine this: You’ve been tasked with breaching a company’s defences during a pentesting engagement. Their firewalls are rock-solid, and their intrusion detection systems are impenetrable

Search for a command to run...
Articles tagged with #tryhackme-walkthrough
Introduction Imagine this: You’ve been tasked with breaching a company’s defences during a pentesting engagement. Their firewalls are rock-solid, and their intrusion detection systems are impenetrable

Introduction Vulnerability scanning is an automated process that identifies weaknesses, misconfigurations, and potential security issues across systems, networks, web applications, and devices. It’s u

Introduction Wazuh(opens in new tab) is a free and open-source security platform used for threat prevention, detection, and response. It is widely deployed across enterprises as a Security Information

Introduction As you move into a senior (Level 2) analyst role, the scope of your responsibilities shifts. Technical alert triage is still part of the job, but your findings now need to reach people be

This writeup covers a macOS Forensics: Artefacts challenge on TryHackMe involving the analysis of a 25GB disk image from a macOS 15.1.1 (Sequoia) system. The investigation required extracting user act

Website defacement is one of the more visible outcomes of a successful cyberattack, and investigating one end-to-end is a great way to practice mapping attacker behavior across the full Cyber Kill Cha
