Detection Techniques
May 25, 2024
...Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.
...Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
https://tryhackme.com/r/room/dailybugle
...Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.
https://tryhackme.com/r/room/steelmountain
...Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
https://tryhackme.com/r/room/kenobi
...Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
https://tryhackme.com/r/room/blue
...Learn about active recon, web app attacks and privilege escalation.
https://tryhackme.com/r/room/vulnversity
...