Challenge Information Advent of Cyber Day 13 THM link here Explanation Today’s challenge is more on theory where it explain about Incident Analysis, firewall and honeypot. Question 1: Whi...
Challenge Information Advent of Cyber Day 12 THM link here Explanation Today’s challenge will be related to Jenkins web application. We were given a ssh credentials to start with. Questio...
Challenge Information Advent of Cyber Day 11 THM link here Explanation Today’s topic is about active directory which is something that I’m weak at. Before starting the challenge, We will n...
Challenge Information Advent of Cyber Day 10 THM link here Explanation Today’s challenge will be web applicatio focusing on SQL injection. Question 1: Manually navigate the defaced websi...
Challenge Information Advent of Cyber Day 9 THM link here Explanation Today’s challenge is actually related to previous day by analyzing the executable. This challenge will be focusing on ...
Challenge Information Advent of Cyber Day 8 THM link here Explanation This challenge will be focusing on how to use FTK imager. What is the malware C2 server To search for the C2 server,...
Challenge Information Advent of Cyber Day 7 THM link here Explanation Today’s challenge focus on analyzing log files with the help of bash commands such as cut, uniq and many more. As the ...
Challenge Information Advent of Cyber Day 6 THM link here Explanation Today’s challenge is mainly interacting with a program that they created. The program teach more about memory corrupti...
Challenge Information Advent of Cyber Day 5 THM link here Explanation Today’s task is just basically changing the magic bytes in Windows by using MS-DOS. The first thing is to read the REA...
Challenge Information Advent of Cyber Day 4 THM link here Explanation This challenge focus on 2 main tools which are cewl and wfuzz. cewl is a tool that generates credentials based on the ...
A new version of content is available.