Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package THM Room https://tryhackme.com/room/pwnkit TASK 1 : Info Introduction and Deploy Deploy the machine by ...
A revitalised, hands-on showcase involving analysing malicious macro’s, PDF’s and Memory forensics of a victim of Jigsaw Ransomware; all done using the Linux-based REMnux toolset apart of my Malwar...
Investigating “strings” within an application and why these values are important! THM Room https://tryhackme.com/room/malstrings TASK 1 : What are “strings”? What is the name of the account that ...
This room aims towards helping everyone learn about the basics of “Malware Reverse Engineering”. THM Room https://tryhackme.com/room/basicmalwarere TASK 1 : Introduction Read the above. No Answer...
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today. THM Room https://tryhackme.com/room/historyofmalware TASK 1 : Introduction Read ...
The start of a series of rooms covering Malware Analysis… THM Room https://tryhackme.com/room/malmalintroductory TASK 1 : What is the Purpose of Malware Analysis? Ah, now I kinda understand… No A...
Ready for a challenge? Use Autopsy to investigate artifacts from a disk image. THM Room https://tryhackme.com/room/autopsy2ze0 TASK 1 : Windows 10 Disk Image What is the MD5 hash of the E01 image...
Learn how to use Autopsy to investigate artefacts from a disk image. Use your knowledge to investigate an employee who is being accused of leaking private company data. THM Room https://tryhackme....
Learn how to use Redline to perform memory analysis and to scan for IOCs on an endpoint. THM Room https://tryhackme.com/room/btredlinejoxr3d TASK 1 : Introduction Who created Redline? Answer : Fi...
A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done. THM Room https://tryhackme.com/room/investigatingwindows ...
A new version of content is available.