Feb 7 · 2 min read · This blog post documents my complete walkthrough of the Vulneversity box on TryHackMe, from initial enumeration to full root compromise. The goal was to practice core penetration testing skills: enumeration, web exploitation, reverse shells, shell st...
Join discussionJan 19 · 4 min read · The tryhackme challenge (Block) provides us with a PCAP(Packet Capture) file and a dump file LSASS(Local Security Authority Subsystem Service). We have to decrypt the encrypted SMB(Server Message Block) files to find solutions for the given questions...
Join discussion
Dec 8, 2025 · 6 min read · Learning Objectives Today's room will have you taking the place of Elf McBlue, a highly talented member of The Best Festival Company's malware investigation squad. You have been tasked with investigating a highly suspicious executable that is being s...
Join discussion
Dec 6, 2025 · 3 min read · Learning Objectives Understand the concept of authentication and authorization Learn how to spot potential opportunities for Insecure Direct Object References (IDORs) Exploit IDOR to perform horizontal privilege escalation Learn how to turn IDOR ...
Join discussion
Dec 4, 2025 · 4 min read · Learning Objectives Ingest and interpret custom log data in Splunk Create and apply custom field extractions Use Search Processing Language (SPL) to filter and refine search results Conduct an investigation within Splunk to uncover key insights ...
Join discussion
Dec 3, 2025 · 3 min read · Learning Objectives Understand what social engineering is Learn the types of phishing Explore how red teams create fake login pages Use the Social-Engineer Toolkit to send a phishing email In light of several recent cyber security threats again...
Join discussion
Dec 2, 2025 · 3 min read · Learning Objectives Learn the basics of the Linux command-line interface (CLI) Explore its use for personal objectives and IT administration Apply your knowledge to unveil the Christmas mysteries The unthinkable has happened - McSkidy has been k...
Join discussion
Oct 10, 2025 · 4 min read · Introduction: BRIM is an open-source desktop application that processes pcap files and logs files. Its primary focus is providing search and analytics. It uses the Zeek log processing format. It also supports Zeek signatures and Suricata Rules for d...
Join discussionOct 2, 2025 · 2 min read · Category: Enumeration / Privilege EscalationSource: TryHackMe Difficulty: EasyObjective: Capture user & root flags Task 1 Living up to the title. You were boasting on and on about your elite hacker skills in the bar and a few Bounty Hunters decided t...
Join discussion