jcm3Brim | TryHackMe — WalkthroughHey all, this is the twentieth installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the eighth room in this module on…Feb 272
HaircutfishTryHackMe Brim — Task 6 Exercise: Threat Hunting with Brim | Malware C2 DetectionIf you haven’t done tasks 4 & 5 yet, here is the link to my write-up of them: TryHackMe Brim — Task 4 Default Queries & Task 5 Use CasesMar 7, 2023
Motasem HamdanComplete Guide & Tutorial To Brim | Packet Analysis and Investigation | TryHackMeWe covered Brim which is an open source packet and log analyzer. Brim has powerful features that make it ideal for large packet capture…Jan 19Jan 19
HaircutfishTryHackMe Brim — Task 4 Default Queries & Task 5 Use CasesIf you haven’t done tasks 1, 2, & 3 yet, here is the link to my write-up of them: Task 1 Introduction, Task 2 What is Brim?, & Task 3 The…Feb 11, 2023Feb 11, 2023
Samuel NwoyeBuilding a Personal Network and Host Defense System Part 6: Data Ingestion and Visualization With…Finally the King needs to have a holistic report on the state of the castle. How many enemies approaching the wall were gunned down. The…Nov 26, 2023Nov 26, 2023
jcm3Brim | TryHackMe — WalkthroughHey all, this is the twentieth installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the eighth room in this module on…Feb 272
HaircutfishTryHackMe Brim — Task 6 Exercise: Threat Hunting with Brim | Malware C2 DetectionIf you haven’t done tasks 4 & 5 yet, here is the link to my write-up of them: TryHackMe Brim — Task 4 Default Queries & Task 5 Use CasesMar 7, 2023
Motasem HamdanComplete Guide & Tutorial To Brim | Packet Analysis and Investigation | TryHackMeWe covered Brim which is an open source packet and log analyzer. Brim has powerful features that make it ideal for large packet capture…Jan 19
HaircutfishTryHackMe Brim — Task 4 Default Queries & Task 5 Use CasesIf you haven’t done tasks 1, 2, & 3 yet, here is the link to my write-up of them: Task 1 Introduction, Task 2 What is Brim?, & Task 3 The…Feb 11, 2023
Samuel NwoyeBuilding a Personal Network and Host Defense System Part 6: Data Ingestion and Visualization With…Finally the King needs to have a holistic report on the state of the castle. How many enemies approaching the wall were gunned down. The…Nov 26, 2023
InSystem Weaknessbyalda69Warzone1 WriteupThis is a writeup to the brand new CTF on TryHackMe.Oct 30, 2022
Cyber ReyBrim TryHackme WalkthroughLearn and practice log investigation, pcap analysis and threat hunting with Brim.Nov 16, 2023
HaircutfishTryHackMe Brim — Task 7 Exercise: Threat Hunting with Brim | Crypto Mining & Task 8 ConclusionIf you haven’t done task 6 yet, here is the link to my write-up of them: Task 6 Exercise: Threat Hunting with Brim | Malware C2 DetectionApr 19, 2023