Motasem HamdanIncident Response in Cyber Security | Identification & Scoping Phase | TryHackMeWe covered the second phase of incident response, that is, identification & scoping or detection phase. In the detection phase, the SOC…13h ago13h ago
Motasem HamdanLinux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP MachineWe demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts and used…1d ago1d ago
Motasem HamdanHow can stored XSS vulnerability lead to cookie stealing?we covered brief introduction to both types of cross site scripting vulnerability (XSS), reflected & stored xss, and demonstrated a…4d ago4d ago
Motasem HamdanCyber Security Incident Response Explained | Preparation Phase | TryHackMe PreparationWe covered an introduction to incident response in cyber security including the phases starting with prepraration, identification then…6d ago6d ago
Motasem HamdanPractical Purple Team | TryHackMe Atomic Bird Goes Purple #1We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact of said emulation by…Jul 17Jul 17
Motasem HamdanHackTheBox Academy CTF WalkthroughIn this post, we demonstrated Laravel PHP CVE-2018–15133 and conducted privilege escalation by finding stored credentials. This video was…Jul 15Jul 15
Motasem HamdanNoSQL Injection For Beginners | TryHackMe NoSQL InjectionWe covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed the two basic types of NoSQL…Jul 14Jul 14
Motasem HamdanLinux Ransomware Analysis with Ghidra & Any.RunWe analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we performed dynamic…Jul 12Jul 12
Motasem HamdanComplete Guide to Threat Emulation Using Caldera | TryHackMe CALDERAWe covered threat emulation using Caldera which is a popular tool that can be used to emulate adversary and attacker’s behavious as well as…Jul 9Jul 9