Erchiqui MohammedGoogle DorkingExplaining how Search Engines work and leveraging them into finding hidden content!Mar 30, 2023Mar 30, 2023
Erchiqui MohammedActive Directory BasicsThis room will introduce the basic concepts and functionality provided by Active Directory.Mar 29, 2023Mar 29, 2023
Erchiqui MohammedJuicy Details :Try Hack MeWhat tools did the attacker use? (Order by the occurrence in the log): Download the file and extract the content :Mar 15, 2023Mar 15, 2023
Erchiqui MohammedConti : TryHACKMECan you identify the location of the ransomware?Mar 12, 2023Mar 12, 2023
Erchiqui MohammedThreat Intelligence ToolsExplore different OSINT tools used to conduct security threat assessments and investigations.Feb 24, 2023Feb 24, 2023
Erchiqui MohammedPS EclipseA suspicious binary was downloaded to the endpoint. What was the name of the binary?Feb 10, 2023Feb 10, 2023
Erchiqui MohammedIntroduction to SIEMSIEM is a tool that centralizes data from various endpoints/devices in a network and performs correlation on the data. The purpose of…Feb 9, 2023Feb 9, 2023