Feb 14 · 8 min read · Task 1 Scenario Eric Fischer from the Purchasing Department at Bartell Ltd has received an email from a known contact with a Word document attachment. Upon opening the document, he accidentally clicked on "Enable Content." The SOC Departmen...
Join discussion
Feb 7 · 2 min read · [ link: https://chatgpt.com/share/69868332-b6a0-800f-b3f5-a491c251f128 ] To read and analyze a .pcap file generated by tcpdump, use one of the methods below, depending on whether you prefer command-line or GUI tools. 1. Read a PCAP file using tcpdum...
Join discussionFeb 6 · 3 min read · LokiBot is a long‑running credential‑stealing trojan designed to harvest usernames, passwords, browser data, and cryptocurrency wallets. First appearing in 2016 and attributed to a developer known as “lokistov” or “Carter,” it quickly became popular ...
Join discussion
Jan 28 · 6 min read · Introduction: Why Wireshark Matters in Cybersecurity Wireshark is one of the most powerful tools in networking and cybersecurity. It lets you capture and analyze network traffic in real time, basically showing you what your computer is “saying” on th...
Join discussion
Jan 19 · 4 min read · The tryhackme challenge (Block) provides us with a PCAP(Packet Capture) file and a dump file LSASS(Local Security Authority Subsystem Service). We have to decrypt the encrypted SMB(Server Message Block) files to find solutions for the given questions...
Join discussion
Jan 20 · 4 min read · Room Link: https://tryhackme.com/room/mitmdetection Task 1 Introduction Man-in-the-middle (MITM) attacks represent one of the most insidious threats in network security. In these attacks, attackers position themselves between legitimate communication...
Join discussion
Jan 19 · 4 min read · Room Link: https://tryhackme.com/room/dataexfildetection Task 1: Introduction Data exfiltration is the unauthorized transfer of sensitive data from a computer or other device. It's a primary objective for attackers who have breached a network. As a S...
Join discussion