TryHackMe - Benign Walkthrough
We will investigate host-centric logs in this challenge room to find suspicious process execution. To learn more about Splunk and how to investigate the logs, look at the rooms splunk101 and splunk201.
We will investigate host-centric logs in this challenge room to find suspicious process execution. To learn more about Splunk and how to investigate the logs, look at the rooms splunk101 and splunk201.
You won't find the admin's secret password in this binary. We even encrypted it with a secure one-time-pad. Can you still recover the password?
This blog aims to provide a clear and comprehensive understanding of threat intelligence and threat hunting, their differences and how they work together.
TIS-100 is an open-ended programming game by Zachtronics, the creators of SpaceChem and Infinifactory, in which you rewrite corrupted code segments to repair the TIS-100 and unlock its secrets. It’s the assembly language programming game you never asked for!
In a dramatic turn of events, CrowdStrike's latest update inadvertently triggered the dreaded Blue Screen of Death (BSOD) for numerous users. As if the chaos wasn't enough, opportunistic threat actors seized the moment, posing as CrowdStrike support to distribute malware...
There is something on my shop network running at `nc mercury.picoctf.net 16524`, but I can't tell what it is. Can you?
Testing and validation form a part of the life cycle of every security system in the cybersecurity world. In the ever-increasing pantheon of tools at the disposal of security researchers stands one that has grown to become a de facto standard for testing...
It's a Friday evening at PandaProbe Intelligence when a notification appears on your CTI platform. While most are already looking forward to the weekend, you realize you must pull overtime because SwiftSpend Finance has opened a new ticket, raising concerns about potential malware threats.
Malware analysis is a crucial discipline within the field of cybersecurity that involves the in-depth examination of malicious software, often referred to as "malware."
Wannacry is a ransomware that utilized the EternalBlue exploit to propagate through the targets network and attacked outdated Windows computers globally in May of 2017.