cybersecurity
-
Weekly Cybersecurity Wrap-up 11/13/23
Learn Cybersecurity with me. I’m posting my journey here. Webinars/Videos Articles Podcasts Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | Complete! TryHackMe – SOC Level 1(92 % Complete): Intro to Malware Analysis UDemy – Python for Cybersecurity – Gitlab
-
TryHackMe – Intro to Malware Analysis Walkthrough
In this walkthrough we will go step by step to answer the questions. Task 1: Introduction No questions here, so let’s keep moving. Task 2: Malware Analysis Question: Which team uses malware analysis to look for IOCs and hunt for malware in a network? The answer can be found in the reading in “The purpose
-
Weekly Cybersecurity Wrap-up 11/06/23
Webinars Some good youtubes this week… Articles Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | This is a long one, I’m still working on it. TryHackMe – SOC Level 1(91 % Complete): TheHive – Complete UDemy – Python for Cybersecurity – Gitlab
-
Smishing Example
What is Smishing? Smishing, a portmanteau of “phishing” and “SMS,” the latter being the protocol used by most phone text messaging services, is a cyberattack that uses misleading text messages to deceive victims. The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing
-
TryHackMe – TheHive Project Walkthrough
Task 1 & 2 are easy “I read this” ones, so let’s skip to… Task 3 Question 1: Which open-source platform supports the analysis of observables within TheHive? In the reading under “Observable Enrichment with Cortex” bullet it explains that One of the main feature integrations TheHive supports is Cortex Answer: Cortex
-
Weekly Cybersecurity Wrap-up 10/30/23
Happy Halloween! It’s already the end of the year! Time files when you are learning cybersecurity! Videos Articles Podcasts Cyberwire Daily – Ep 1940 | 11.2.23 – The beginning of an international consensus on AI governance may be emerging from Bletchley Park. Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation
-
TryHackMe Velociraptor Walk-Through
First task that has any questions is… Task 2 Question 1: Using the documentation, how would you launch an Instant Velociraptor on Windows? It’s in the documentation. Scroll to “Instant Velociraptor” and you will find… Answer: Velociraptor.exe gui Task 3 Question 1: What is the hostname for the client? Open the Ubuntu terminal and run:
-
Weekly Cybersecurity Wrap-up 10/23/23
Webinars Articles Podcasts Projects
-
Book Review: Confident Cyber Security
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career by Jessica Barker The Book in 3 Sentences Impressions As I said in point 3 above, the book spent all its content educating on the basics of cyber and did not dive deep into getting into the field or futureproofing your
-
TryHackMe – Volatility Walk-Through
This will only cover Task 10 – Practical Investigations Question 1: What is the build version of the host machine in Case 001? In the above screenshot look at NTBuildLab. Answer: 2600.xpsp.080413-2111 Question 2: At what time was the memory file acquired in Case 001? Also, in the previous screenshot look at SystemTime. Answer: 2012-07-22
