TrntyTryHackMe | Introduction To Honeypots WalkthroughA guided room covering the deployment of honeypots and analysis of botnet activitiesSep 7Sep 7
TrntyTryHackMe | Redline WalkthroughLearn how to use Redline to perform memory analysis and to scan for IOCs on an endpoint.Jun 29Jun 29
TrntyTryHackMe | Moniker Link (CVE-2024–21413) WalkthroughLeak user’s credentials using CVE-2024–21413 to bypass Outlook’s Protected View.Feb 29Feb 29
TrntyTryHackMe | REvil Corp WalkthroughYou are involved in an incident response engagement and need to analyze an infected host using Redline.Feb 3Feb 3
TrntyTryHackMe | Dreaming WalkthroughSolve the riddle that dreams have woven.Nov 19, 2023Nov 19, 2023
TrntyTryHackMe | Probe WalkthroughUse your baseline scanning skills to enumerate a secure network.Nov 11, 2023Nov 11, 2023
TrntyTryHackMe | Carnage WriteUpApply your analytical skills to analyze the malicious network traffic using Wireshark.Nov 5, 2023Nov 5, 2023
TrntyTryHackMe | Servidae: Log Analysis in ELK WalkthroughAnalyze the logs of an affected workstation to determine the attacker’s indicators of compromise.Nov 5, 2023Nov 5, 2023