PinnedRahul KumarLinux Forensics | Tryhackme WalkthroughLearn about the common forensic artifacts found in the Linux Operating System file system.Apr 29, 2023Apr 29, 2023
Rahul KumarPhishing | Tryhackme WalkthroughLearn what phishing is and why it’s important to a red team engagement. You will set up phishing infrastructure, write a convincing…Jul 25Jul 25
Rahul KumarRed Team Engagements | Tryhackme WalkthroughLearn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.Jul 24Jul 24
Rahul KumarGovernance & Regulation | Tryhackme WalkthroughExplore policies and frameworks vital for regulating cyber security in an organisation.Jun 12Jun 12
Rahul KumarWireshark: The Basics | Tryhackme WalkthroughLearn the basics of Wireshark and how to analyse protocols and PCAPs.Jun 10Jun 10
Rahul KumarHydra | Tryhackme WalkthroughLearn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website’s credentials.May 24May 24
Rahul KumarPython for Pentesters | Tryhackme WalkthroughPython is probably the most widely used and most convenient scripting language in cybersecurity. This room covers real examples of Python…May 23May 23
Rahul KumarPython Basics | Tryhackme WalkthroughUsing a web-based code editor, learn the basics of Python and put your knowledge into practice by eventually coding a short Bitcoin…May 23May 23
Rahul KumarNet Sec Challenge | Tryhackme WalkthroughPractice the skills you have learned in the Network Security module.Apr 24Apr 24