Nayanjyoti KumarTryHackMe — Biohazard — WalkthroughA CTF room based on the old-time survival horror game, Resident Evil. Can you survive until the end?6d ago6d ago
Nayanjyoti KumarTryHackMe — Nmap Live Host Discovery — WalkthroughLearn how to use Nmap to discover live hosts using ARP scan, ICMP scan, and TCP/UDP ping scan.Aug 26Aug 26
Nayanjyoti KumarTryhackme — Cyber Kill Chain — WalkthroughThe Cyber Kill Chain framework is designed for identification and prevention of the network intrusions. You will learn what the…Aug 26Aug 26
Nayanjyoti KumarTryHackMe — SNORT— WalkthroughLearn how to use Snort to detect real-time threats, analyse recorded traffic files and identify anomalies.Aug 23Aug 23
Nayanjyoti KumarTryHackMe — OWASP Top 10 — WalkthroughLearn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.Aug 3Aug 3
Nayanjyoti KumarTryHackMe — OWASP Top 10–2021 — WalkthroughLearn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.Jul 29Jul 29
Nayanjyoti KumarTryHackMe — How Websites Work — WalkthroughTo exploit a website, you first need to know how they are created.Jul 29Jul 29
Nayanjyoti KumarTryHackMe — Putting it all together — WalkthroughLearn how all the individual components of the web work together to bring you access to your favourite web sites.Jul 29Jul 29
Nayanjyoti KumarTryHackMe — Attacktive Directory99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?Jul 25Jul 25