Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code. THM Room https://tryhackme.com/room/obfuscationprinciples TASK 1 : Introduction Read the ...
Understand how antivirus software works and what detection techniques are used to bypass malicious file checks. THM Room https://tryhackme.com/room/introtoav TASK 1 : Introduction Let’s get start...
Learn how to interact with the win32 API and understand its wide range of use cases THM Room https://tryhackme.com/room/windowsapi TASK 1 : Introduction Read the above and continue to the next ta...
An introduction to Data Exfiltration and Tunneling techniques over various protocols. THM Room https://tryhackme.com/room/dataxexfilt TASK 1 : Introduction Read the task above! No Answer TASK 2 ...
Manipulating DNS queries to our advantage THM Room https://tryhackme.com/room/dnsmanipulation TASK 1 : Introduction Read the above No Answer TASK 2 : Installation Ready! Installed all required t...
This room will introduce the basic concepts and functionality provided by Active Directory. THM Room https://tryhackme.com/room/winadbasics TASK 1 : Introduction Click and continue learning! No A...
Learn the fundamentals of Windows privilege escalation techniques. THM Room https://tryhackme.com/room/windowsprivesc20 TASK 1 : Introduction Click and continue learning! No Answer TASK 2 : Wind...
This room is an introduction to enumeration when approaching an unknown corporate environment. THM Room https://tryhackme.com/room/enumerationpe TASK 1 : Introduction What command would you use t...
Explore different OSINT tools used to conduct security threat assessments and investigations. THM Room https://tryhackme.com/room/threatinteltools TASK 1 : Room Outline Read the description! Cont...
In this room you’ll learn what CSP is, what it’s used for and how to recognize vulnerabilities in a CSP header. THM Room https://tryhackme.com/room/csp TASK 1 : Introduction What does CSP stand f...
A new version of content is available.