LSLEWIS SAWEinlewisawe.hashnode.dev00Juicy Details - THM Challenge Room WalkthroughMar 25 · 6 min read · Introduction You were hired as a SOC Analyst for one of the biggest Juice Shops in the world and an attacker has made their way into your network. Your tasks are: Figure out what techniques and toolJoin discussion
LSLEWIS SAWEinlewisawe.hashnode.dev00Hunt Me II: Typo Squatters - THM WalkThroughMar 23 · 6 min read · Scenario Just working on a typical day as a software engineer, Perry received an encrypted 7z archive from his boss containing a snippet of a source code that must be completed within the day. RealisiJoin discussion
LSLEWIS SAWEinlewisawe.hashnode.dev00Slingshot - TryHackMe Walk ThroughMar 22 · 5 min read · Slingway Inc., a leading toy company, has recently detected suspicious activity on its e-commerce web server and potential unauthorized modifications to its database. To investigate the incident, you Join discussion
LSLEWIS SAWEinlewisawe.hashnode.dev00Fixit - Try Hack Me Walk Through Mar 22 · 5 min read · Welcome to this hands-on challenge room. In this scenario, you've just completed your third screening interview for a Level 2 role at MSSP Cybertees Ltd, and you're now faced with the final assessmentJoin discussion
LSLEWIS SAWEinlewisawe.hashnode.dev00Hunt Me I: Payment Collectors - Try Hack Me Walk through Mar 19 · 5 min read · On Friday, September 15, 2023, Michael Ascot, a Senior Finance Director from SwiftSpend, was checking his emails in Outlook and came across an email appearing to be from Abotech Waste Management regarJoin discussion