label.categoryPage - tryhackme


Sun Apr 27 2025
864 label.wordCount 路 6 label.readTime

Memory Forensics Walkthrough

Using Volatility to Perform Memory Forensics and Extract Flags

Memory Forensics Walkthrough
Sat Feb 08 2025
3378 label.wordCount 路 20 label.readTime

Digital Forensics Case B4DM755

Acquire the critical skills of evidence preservation, disk imaging, and artefact analysis for use in court.

Digital Forensics Case B4DM755
Sat Feb 08 2025
1149 label.wordCount 路 8 label.readTime

Forensic

This memory dump originates from a compromised system. Perform in-depth forensics to explore its internals.

Forensic
Sat Feb 01 2025
938 label.wordCount 路 6 label.readTime

Conti

An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.

Conti
Sat Feb 01 2025
976 label.wordCount 路 7 label.readTime

REvil Corp

You are involved in an incident response engagement and need to analyze an infected host using Redline

REvil Corp
Sun Sep 22 2024
5186 label.wordCount 路 30 label.readTime

Firewall Fundamentals

Explore and master the Linux iptables firewall and its utilities for managing network traffic and enhancing security on Linux systems.

Firewall Fundamentals
Sun Sep 22 2024
1994 label.wordCount 路 13 label.readTime

Legal Considerations in DFIR

Understand the processes involved in DFIR and the legal considerations that guide them.

Legal Considerations in DFIR
Sun Sep 22 2024
4498 label.wordCount 路 27 label.readTime

Networking Concepts

Learn about the ISO OSI model and the TCP/IP protocol suite.

Networking Concepts