Data Exfiltration Detection (TryHackMe)
Data exfiltration is the final and often most damaging stage of a cyberattack — the moment sensitive information leaves the organization's control. Whether through DNS tunneling, HTTP POST requests, F

Search for a command to run...
Articles tagged with #wireshark
Data exfiltration is the final and often most damaging stage of a cyberattack — the moment sensitive information leaves the organization's control. Whether through DNS tunneling, HTTP POST requests, F

The web is one of the most exposed entry points for attackers, making web applications a frequent target in modern security incidents. From client-side exploits that trick users into compromising their own devices to server-side attacks that directly...

In this challenge, we investigate a data breach involving a compromised NFS server. An intruder infiltrated the network and accessed backup files containing classified data. The only artifact available for analysis is a network packet capture (challe...

Welcome to Spice Hut, a quirky startup that sells spices and sandwiches—but more importantly, has questionable security practices. As part of a penetration testing engagement, our goal was to assess their infrastructure and attempt full system compro...

In this article, we’ll cover Communication protocols - You can’t hurt SOC-mas, Mayor Malware! write-up as the Day 24 challenge of the Advent of Cyber event challenge. It involved using Wireshark to analyze MQ Telemetry Transport Protocol (MQTT) on an...

In this article, we’ll cover Traffic analysis - If you utter so much as one packet! write-up as the Day 20 challenge of the Advent of Cyber event challenge. It involved using Wireshark to conduct traffic analysis on Windows. We’re still at Wareville ...
