Motasem HamdanXOR Cryptography with Python | TryHackMe W1seGuyWe solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and encode the challenge flag. We used…1d ago1d ago
Motasem HamdanSecurity Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red TeamWe covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a library of techniques mapped…4d ago4d ago
Motasem HamdanDetecting Active Directory Kerberos Attacks | HackTheBox Sherlocks Campfire-1 & 2In this post, we covered the solution walkthroughs for two HackTheBox Sherlock challenges, which are, HackTheBox Campfire-1 and 2. These…5d ago5d ago
Motasem HamdanThreat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat EmulationWe covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing in addition…Jun 30Jun 30
Motasem HamdanDNS Tunneling Explained | TryHackMe DNS Data ExfiltrationWe covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS data exfiltration. This was part of…Jun 29Jun 29
Motasem HamdanRansomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo SquattersWe covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect machines with Windows installer…Jun 27Jun 27
Motasem HamdanThreat Hunting Case Study | The Strange Invoice | TryHackMe Hunt Me 1: Payment CollectorsWe covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine due to recent phishing…Jun 24Jun 24
Motasem HamdanMicrosoft Cybersecurity Analyst Professional Certificate Review SC-900The Microsoft Cybersecurity analyst from coursera covers the below courses:Jun 23Jun 23
Motasem HamdanAndroid Reverse Engineering | Part 2 | Extracting Encrypted SecretsWe covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to…Jun 21Jun 21
Motasem HamdanWindows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato WalkthroughIn this post, we covered the solution of Cyberseclabs potato where we demonstrated the exploitation of a vulnerable Jenkins server and the…Jun 20Jun 20