Igor_sec's Blog
Hello! Welcome to my blog where I post write-ups for CTF challenges.
Hello! Welcome to my blog where I post write-ups for CTF challenges.
Learn and practice log investigation, pcap analysis and threat hunting with Brim. Link: https://tryhackme.com/room/brim “BRIM is an open-source desktop application that processes pcap files and logs files. Its primary focus is providing search and analytics. In this room, you will learn how to use Brim, process pcap files and investigate log files to find the…
Learn the basics of traffic analysis with Wireshark and how to find anomalies on your network! Link: https://tryhackme.com/room/wiresharkpacketoperations “In this room, we will cover the techniques and key points of traffic analysis with Wireshark and detect suspicious activities. Note that this is the third and last room of the Wireshark room trio, and it is…
Learn the fundamentals of packet analysis with Wireshark and how to find the needle in the haystack! Link: https://tryhackme.com/room/wiresharkpacketoperations “In this room, we will cover the fundamentals of packet analysis with Wireshark and investigate the event of interest at the packet-level. Note that this is the second room of the Wireshark room trio, and it…
I never thought of starting a CTF blog. But after completing a few challenges from TryHackMe, BTLO, CyberDefenders, and HTB, I came to the realization that taking notes is not enough to reinforce what I have learned in the rooms I have completed. Anyway, here are the “Why’s” of this blog. This is an exciting…
Scenario 1 (APT): The focus of this hands on lab will be an APT scenario and a ransomware scenario. You assume the persona of Alice Bluebird, the soc analyst who has recently been hired to protect and defend Wayne Enterprises against various forms of cyberattack. In this scenario, reports of the below graphic come in…
Introduction: In this machine, I will try to exploit a vulnerable windows machine. It involves some of the basic penetration phases such as information gathering, threat modelling or vulnerability identification, exploitation, and post-exploitation. This room will also illustrate two methods of gaining access and escalating privileges. Information Gathering: I started with enumerating the services , OS…
My first ever blog on becoming a Cyber Security Professional. I am on a learning journey and would appreciate positive feedback. This is a machine for practicing web app hacking and privilege escalation. It is included as part of the Complete Beginner Path. First thing to do is to start and connect to the machine,…