Motasem HamdanWhat is AuditingThe purpose of audit processes is to determine the exact condition of a specific aspect of business operations. This is done by defining…4h ago4h ago
Motasem HamdanReal World Phishing Email Analysis | TryHackMe Snapped Phishing LineIntroduction15h ago15h ago
Motasem HamdanHow to Use Volatility in Memory Forensics | TryHackMe CriticalThe post provides a detailed overview of memory forensics, a key aspect of cybersecurity. It focuses on how volatile memory, particularly…2d ago2d ago
Motasem HamdanHackTheBox EvilCUPS Walkthrough | Exploiting Linux CUPS PrintersIntroduction6d ago6d ago
Motasem HamdanWindows Forensics With Autopsy & Registry Explorer | TryHackMe UnattendedThis article provided a walkthrough for the “unattended” challenge from TryHackMe, which focuses on Windows forensics.Oct 14Oct 14
Motasem HamdanOffensive Security Proving Grounds OnSystemShellDredd Writeup | OSCP WriteupThe article details a penetration testing walkthrough for the Offensive Security Proving Grounds (OSPG) machine named ShellDredd, useful…Oct 13Oct 13
Motasem HamdanDefensive Security Explained | TryHackMe Intro to Defensive SecurityThe article provides an introduction to defensive security, emphasizing the role of blue teams in protecting systems against threats. Key…Oct 11Oct 11