Tryhackme: Security Principles Writeup
This blog post is the Tryhackme Security Principles room writeup. Solutions are explained in detail and with screenshots.
Aleyna
I am a cyber threat intelligence analyst, and this category contains my cybersecurity posts.
This blog post is the Tryhackme Security Principles room writeup. Solutions are explained in detail and with screenshots.
This blog post is the Tryhackme Introduction to Cryptography room writeup. Solutions are explained in detail and with screenshots.
This blog post is the Tryhackme Security Engineer Intro room writeup. Solutions are explained in detail and with screenshots.
This blog post is the Tryhackme NetworkMiner room writeup. Solutions are explained in detail and with screenshots.
The Room: “Learn in-depth how nmap TCP connect scan, TCP SYN port scan, and UDP port scan work.” https://tryhackme.com/room/nmap02 Task 2: TCP and UDP Ports 2.1. Which service uses UDP port 53 by default? DNS 2.2. Which service uses TCP port 22 by default? SSH 2.3. How many port states does Nmap consider? 6 2.4. …
The Room: “Learn the basics of Wireshark and how to analyse protocols and PCAPs.” https://tryhackme.com/room/wiresharkthebasics Task 1: Introduction 1.1. Which file is used to simulate the screenshots? http1.pcapng 1.2. Which file is used to answer the questions? Exercise.pcapng Task 2: Tool Overview 2.1. Read the “capture file comments”. What is the flag? TryHackMe_Wireshark_Demo 2.2. What …
The room: “Learn how to utilise Threat Intelligence to improve the Security Operations pipeline.” https://tryhackme.com/room/threatintelligenceforsoc 2.1. How many unique IP addresses were provided in the IOC list? We need to remove duplicates from the IP list given to us. We can use many tools such as Excel, Dcode, etc. to remove duplicates. Removing duplicate IP …
The room: “Apply learned skills to probe malicious emails and URLs, exposing a vast phishing campaign.“ https://tryhackme.com/r/room/snappedphishingline 1.1. Who is the individual who received an email attachment containing a PDF? William McClean 1.2. What email address was used by the adversary to send the phishing emails? Accounts.Payable@groupmarketingonline.icu 1.3. What is the redirection URL to the …
The room: “Learn about Shodan.io and how to use it for devices enumeration – is your coffee machine publicly accessible?”
The room: “Conducting basic open source intelligence research on a website”