PinnedJoseph AlaninSystem WeaknessTryHackMe Critical Write-Up: Using Volatility For Windows Memory ForensicsThis challenge focuses on memory forensics, which involves understanding its concepts, accessing and setting up the environment using tools…Jul 18Jul 18
Joseph AlaninSystem WeaknessTryHackMe Friday Overtime Write-Up: Cyber Threat Intelligence AnalysisThis challenge involves analyzing malware within a secure VM environment, employing both automated tools and manual techniques to…Jul 26Jul 26
Joseph AlanProfiles TryHackMe Write-up: Linux Memory Forensics Using Volatility & Building Custom Profiles For…This room focuses on advanced Linux memory forensics with Volatility, highlighting the creation of custom profiles for kernels or operating…Jun 9Jun 9
Joseph AlanTryHackme Expediting Registry Analysis Write-UpThis Room involves acquiring live and cold system registry hives, using tools to analyze and parse the data in these hives, and addressing…Jun 7Jun 7
Joseph AlaninSystem WeaknessTryHack3M: Bricks Heist Write-UpThis room focuses on skills and techniques, including Remote Code Execution using the CVE-2024–25600 vulnerability in the Bricks WordPress…Apr 171Apr 171
Joseph AlaninDev GeniusTryHackMe Creative Write-UpThis challenge focuses on vulnerabilities such as SSRF to illicitly access system files, resources along with testing for SSRF using…Apr 13Apr 13
Joseph AlaninDev GeniusTryHackMe Request Smuggling: WebSockets Write-UpThis challenge demonstrates the exploitation of WebSocket vulnerabilities to bypass proxy servers and the restrictions placed by themMar 26Mar 26
Joseph AlanTryHackMe HackSmarter Write-UpThis room is dedicated to offensive penetration testing techniques, skills in network firewall evasion, bypassing Windows Defender, and…Mar 19Mar 19