Open in app

Sign In

Write

Sign In

Nehru G
Nehru G

87 Followers

Home

About

5 days ago

MalBuster — TryHackMe

Task 1 Introduction This room aims to be a practice room for Dissecting PE Headers and Static Analysis 1. In this scenario, you will act as one of the Reverse Engineers that will analyse malware samples based on the detections reported by your SOC team. Prerequisites This room requires basic…

Tryhackme Walkthrough

3 min read

MalBuster — TryHackMe
MalBuster — TryHackMe
Tryhackme Walkthrough

3 min read


Nov 23, 2022

Windows Reversing Intro-TryHackMe

this is enough! if you want full task. just command here!! Task 4 Analysis Function Call Sample When running the samples on their own, outside of IDA, run them via the command line. Before you load the program into IDA, I want to quickly repeat a warning. When you are prompted for debug symbols do not…

Tryhackme

13 min read

Windows Reversing Intro-TryHackMe
Windows Reversing Intro-TryHackMe
Tryhackme

13 min read


Nov 23, 2022

Intro PoC Scripting -TryHackMe

Task 1 Introduction What are PoC scripts? Greetings! This room is an introduction to a fundamental skill of most cybersecurity domains; exploit development by crafting exploit scripts from proof of concept code. This room intends to introduce beginner skills and concepts that can be adapted to many different types of exploits.The prerequisite skills I’d recommend for…

Tryhackme

22 min read

Intro PoC Scripting -TryHackMe
Intro PoC Scripting -TryHackMe
Tryhackme

22 min read


Nov 23, 2022

Snort -TryHackMe

Task 1-Introduction This room expects you to be familiar with basic Linux command-line functionalities like general system navigation and Network fundamentals (ports, protocols and traffic data). The room aims to encourage you to start working with Snort to analyse live and captured traffic. Before joining this room, we suggest completing the ‘Network…

Tryhackme

42 min read

Snort -TryHackMe
Snort -TryHackMe
Tryhackme

42 min read


Aug 24, 2022

Wireshark: Packet Operations | TryHackMe

Task 1 - Introduction In this room, we will cover the fundamentals of packet analysis with Wireshark and investigate the event of interest at the packet-level. …

Tryhackme

15 min read

Wireshark: Packet Operations | TryHackMe
Wireshark: Packet Operations | TryHackMe
Tryhackme

15 min read


Aug 17, 2022

Enumeration — TryHackMe

Task 1- Introduction This room focuses on post-exploitation enumeration. In other words, we assume that we have successfully gained some form of access to a system. Moreover, we may have carried out privilege escalation; in other words, we might have administrator or root privileges on the target system. Some of…

Tryhackme

21 min read

Enumeration — TryHackMe
Enumeration — TryHackMe
Tryhackme

21 min read


Aug 11, 2022

Intro to C2 | TryHackMe

Task 1-Introduction Welcome to Intro to C2 Command and Control (C2) Frameworks are an essential part of both Red Teamers and Advanced Adversaries playbooks. They make it both easy to manage compromised devices during an engagement and often help aid in lateral movement. Room Objectives In this room, we will learn about Command and Control…

Tryhackme

36 min read

Intro to C2 | TryHackMe
Intro to C2 | TryHackMe
Tryhackme

36 min read


Aug 9, 2022

Windows Forensics 2 | TryHackMe

Task 1 -Introduction

Tryhackme Walkthrough

23 min read

Windows Forensics 2 | TryHackMe
Windows Forensics 2 | TryHackMe
Tryhackme Walkthrough

23 min read


Aug 9, 2022

Windows Forensics 1 |TryHackMe

Task 1 -Introduction to Windows Forensics Introduction to Computer Forensics for Windows: Computer forensics is an essential field of cyber security that involves gathering evidence of activities performed on computers. It is a part of the wider Digital Forensics field, which deals with forensic analysis of all types of digital…

Tryhackme Walkthrough

23 min read

Windows Forensics 1 |TryHackMe
Windows Forensics 1 |TryHackMe
Tryhackme Walkthrough

23 min read


Aug 8, 2022

Persisting Active Directory|TryHackMe

Task 1- Introduction This network is the continuation of the Breaching AD, Enumerating AD, and Exploiting AD networks. Please make sure to complete these networks before continuing with this one. Also, note that we will discuss AD objects extensively. If you need a refresher, have a quick reskim of this…

Tryhackme Walkthrough

48 min read

Persisting Active Directory|TryHackMe
Persisting Active Directory|TryHackMe
Tryhackme Walkthrough

48 min read

Nehru G

Nehru G

87 Followers

Pentester

Following
  • A Curious Mind

    A Curious Mind

  • Tal Eliyahu

    Tal Eliyahu

  • Bornunique911

    Bornunique911

  • Songül Kızılay

    Songül Kızılay

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech