• TryHackMe | Boogeyman 3

    TryHackMe | Boogeyman 3

    This room challenged me to analyze the tactics, techniques, and procedures (TTPs) of a sophisticated threat actor known as Boogeyman. The complex hands-on exercise walks… Read more

  • TryHackMe | Boogeyman 2

    TryHackMe | Boogeyman 2

    Task 1  Introduction After having a severe attack from the Boogeyman, Quick Logistics LLC improved its security defences. However, the Boogeyman returns with new and improved… Read more

  • TryHackMe | Boogeyman 1

    TryHackMe | Boogeyman 1

    The room provided a phishing email, endpoint logs, and network traffic to analyze. By studying email headers, parsing JSON logs with JQ, and reconstructing events… Read more

  • TryHackMe | Disk Analysis & Autopsy

    TryHackMe | Disk Analysis & Autopsy

    In this blog, I’ll be documenting my experience with the Disk Analysis & Autopsy room on TryHackMe, which challenged me to leverage disk artifacts to… Read more

  • TryHackMe | REvil Corp

    TryHackMe | REvil Corp

    Investigating the Compromised Endpoint Scenario: One of the employees at Lockman Group gave an IT department the call; the user is frustrated and mentioned that… Read more

  • Cyberdefender | Boss Of The SOCv2

    Cyberdefender | Boss Of The SOCv2

    Details Instructions: APT Scenarios: In this hands-on exercise, you assume the persona of Alice Bluebird, the soc analyst who successfully assisted Wayne Enterprises and was recommended… Read more


Proudly Powered by WordPress