Incident Handling With Splunk (TryHackMe)
Website defacement is one of the more visible outcomes of a successful cyberattack, and investigating one end-to-end is a great way to practice mapping attacker behavior across the full Cyber Kill Cha

Search for a command to run...
Articles tagged with #virustotal
Website defacement is one of the more visible outcomes of a successful cyberattack, and investigating one end-to-end is a great way to practice mapping attacker behavior across the full Cyber Kill Cha

Phishing analysis goes beyond reading email headers manually. In this room, Phishing Emails 2 on TryHackMe, the focus shifts to tooling: automating the extraction of artifacts from suspicious emails a

Malware analysis is a core skill for any SOC analyst or security professional. As part of working through TryHackMe's SOC path, I tackled the Intro to Malware Analysis room — and it turned out to be m

Introduction This room presents you with a challenge to investigate some traffic data as a part of the SOC team. Let's start working with TShark to analyse the captured traffic. We recommend completing the TShark: The Basics and TShark: CLI Wireshark...

Introduction This room presents you with a challenge to investigate some traffic data as a part of the SOC team. Let's start working with TShark to analyse the captured traffic. We recommend completing the TShark: The Basics and TShark: CLI Wireshark...

As part of my role on the SOC team at Managed Server Provider TrySecureMe, I was tasked with investigating suspicious findings that had been escalated by an L1 analyst. The flagged indicators included a suspicious IP address and a SHA256 hash. Using ...
