Dark | Light
# ![@djalilayed Avatar](https://lunarcrush.com/gi/w:26/cr:youtube::UCUTn6ChJY1ttQ_gigG1GRkA.png) @djalilayed Djalil Ayed

Djalil Ayed posts on YouTube about ctf, the first, shell, ai the most. They currently have [-----] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

### Engagements: [------] [#](/creator/youtube::UCUTn6ChJY1ttQ_gigG1GRkA/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCUTn6ChJY1ttQ_gigG1GRkA/c:line/m:interactions.svg)

- [--] Week [-----] +68%
- [--] Month [------] +59%
- [--] Months [------] +52%
- [--] Year [-------] +199%

### Mentions: [--] [#](/creator/youtube::UCUTn6ChJY1ttQ_gigG1GRkA/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCUTn6ChJY1ttQ_gigG1GRkA/c:line/m:posts_active.svg)

- [--] Week [--] +88%
- [--] Month [--] +54%
- [--] Months [---] +50%
- [--] Year [---] +442%

### Followers: [-----] [#](/creator/youtube::UCUTn6ChJY1ttQ_gigG1GRkA/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCUTn6ChJY1ttQ_gigG1GRkA/c:line/m:followers.svg)

- [--] Week [-----] +2.50%
- [--] Month [-----] +9%
- [--] Months [-----] +49%
- [--] Year [-----] +116%

### CreatorRank: [-------] [#](/creator/youtube::UCUTn6ChJY1ttQ_gigG1GRkA/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCUTn6ChJY1ttQ_gigG1GRkA/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  [stocks](/list/stocks)  [finance](/list/finance)  [currencies](/list/currencies)  [travel destinations](/list/travel-destinations)  [cryptocurrencies](/list/cryptocurrencies)  [social networks](/list/social-networks) 

**Social topic influence**
[ctf](/topic/ctf) #24, [the first](/topic/the-first), [shell](/topic/shell), [ai](/topic/ai), [link](/topic/link), [how to](/topic/how-to), [splunk](/topic/splunk), [tools](/topic/tools), [can you](/topic/can-you) #2808, [hidden](/topic/hidden)

**Top accounts mentioned or mentioned by**
[@probablyfinethm](/creator/undefined) [@kingfordacuk](/creator/undefined) [@realtryhackme](/creator/undefined)

**Top assets mentioned**
[Microsoft Corp. (MSFT)](/topic/microsoft) [CyberConnect (CYBER)](/topic/cyber) [FilesCoins Power Cu (FILECOIN)](/topic/files)
### Top Social Posts
Top posts by engagements in the last [--] hours

"TryHackMe Python: Simple Demo ๐Ÿฑ Explore what a basic Python program looks like. ๐Ÿชผ Room link: https://tryhackme.com/room/pythonsimpledemo ๐Ÿฑ Learning Objectives ๐Ÿฑ ๐ŸงLearn about Python variables ๐ŸงUnderstand how conditional statements are used ๐ŸงSee iteration (loop) in action ๐Ÿฑ Room Tasks: ๐Ÿฑ ๐Ÿ’ Task 1: Introduction ๐ŸŒธ Task 2: Variables - What is the name of the function we used to display text on the screen - What is the name of the function that we used to convert user input to an integer ๐Ÿ› Task 3: Conditional Statements - How does Python write else if - What will the program display if"  
[YouTube Link](https://youtube.com/watch?v=E3juPk_igRk)  2026-02-15T10:07Z [----] followers, [--] engagements


"TryHackMe Introduction to Phishing - SOC Simulator - Full Walkthrough [----] - Updated - Elastic ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/soc-sim/scenarios In this video will use Elastic to solve the scenario. ๐Ÿท๐Ÿท ๐Ÿท๐Ÿท TryHackMe SOC Level [--] Video Playlist: https://www.youtube.com/playlistlist=PLrY_AbzZGqt9-_QEdK64kN4RNzqgQ8dQM ๐Ÿšฉ Scenario overview ๐Ÿšฉ Learn how to use SOC Simulator by completing your first scenario. Close all True Positive alerts to pass ๐ŸŽ๐ŸŽ Scenario objectives ๐ŸŽ๐ŸŽ ๐Ÿƒ Monitor and analyze real-time alerts. ๐Ÿƒ Identify and document critical events such as suspicious emails and"  
[YouTube Link](https://youtube.com/watch?v=IDtI2D3e2BE)  2025-11-07T13:20Z [----] followers, [----] engagements


"TryHackMe Data Encoding - Full Walkthrough [----] ๐Ÿฅฅ Learn how computer encodes characters from ASCII to Unicode's UTF. ๐Ÿ”—๐Ÿ”— Room link: https://tryhackme.com/room/dataencoding ๐Ÿšจ Learning Objectives ๐Ÿšจ ๐ŸŽฏ Upon completion of this room you will learn about: ๐ŸŽ ASCII ๐ŸŽ Unicode ๐ŸŽ UTF-8 UTF-16 and UTF-32 ๐ŸŽ How emoji is encoded ๐ŸŽ And what causes weird gibberish characters ๐Ÿšจ Room Tasks: ๐Ÿšจ ๐Ÿ… Task 1: Introduction ๐Ÿฅ Task 2: ASCII ๐Ÿ˜€ Task 3: Unicode ๐Ÿ˜‚ Task 4: Conclusion โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you"  
[YouTube Link](https://youtube.com/watch?v=JZziUmrfOkQ)  2026-02-12T17:56Z [----] followers, [---] engagements


"TryHackMe Cupid's Matchmaker Stored XSS Full Walkthrough [----] ๐Ÿ– Use your web exploitation skills against this matchmaking service. ๐Ÿฆ„ ๐Ÿ† Room Link: https://tryhackme.com/room/lafb2026e3 In this room we use vulnerability on survey form using Stored XSS to get admin cookie which is the flag for this room. ๐Ÿ’Œ My Dearest Hacker ๐Ÿง Tired of soulless AI algorithms At Cupid's Matchmaker real humans read your personality survey and personally match you with compatible singles. Our dedicated matchmaking team reviews every submission to ensure you find true love this Valentine's Day ๐Ÿ’˜No algorithms."  
[YouTube Link](https://youtube.com/watch?v=O1OuohTo3BQ)  2026-02-15T07:37Z [----] followers, [---] engagements


"TryHackMe Speed Chatting File Upload Vulnerability Full Walkthrough [----] ๐Ÿ’˜ Can you hack as fast as you can chat ๐Ÿฆ ๐Ÿ˜€ Room Link: https://tryhackme.com/room/lafb2026e4 ๐Ÿฆ ๐Ÿ˜€ Reverse Shell used on this room: https://github.com/djalilayed/tryhackme/blob/main/Love_at_First%20Breach/Speed_Chatting/reverse_shell.py ๐Ÿฑ In this room we exploit vulnerability on profile upload image it has unrestricted file upload which allow us to upload Python reverse shell then get the flag. ๐Ÿฅž My Dearest Hacker ๐ŸฆŠ Days before Valentine's Day TryHeartMe rushed out a new messaging platform called "Speed Chatter""  
[YouTube Link](https://youtube.com/watch?v=O2qdZ77TG5Q)  2026-02-15T05:01Z [----] followers, [---] engagements


"TryHackMe When Hearts Collide MD5 collision Full Walkthrough [----] โฃ Will you find your MD5 match ๐Ÿ’ ๐Ÿฅ‘ Room link: https://tryhackme.com/room/lafb2026e1 ๐Ÿ’ Tool used: ๐Ÿ’ MD5 collision generator: https://github.com/brimstone/fastcoll We have an app they allow you to upload images and match its md5 value to existing dogs images if md5 match you get the flag. ๐Ÿ’˜ My Dearest Hacker ๐Ÿฆ„ Matchmaker is a playful hash-powered experience that pairs you with your ideal dog by comparing MD5 fingerprints. Upload a photo let the hash chemistry do its thing and watch the site reveal whether your vibe already"  
[YouTube Link](https://youtube.com/watch?v=ReMhp6tHYB8)  2026-02-15T05:01Z [----] followers, [---] engagements


"TryHackMe TryHeartMe JWT Full Walkthrough [----] ๐Ÿ’Œ Access the hidden item in this Valentine's gift shop. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/lafb2026e5 This room about JWT security failure. signature is not being verified ๐ŸฆŠ My Dearest Hacker ๐Ÿฆ’ The TryHeartMe shop is open for business. Can you find a way to purchase the hidden Valenflag item ๐Ÿฑ Website used on this video: ๐Ÿฑ โฃ JSON Web Token (JWT) Debugger: https://www.jwt.io/ โฃ CyberChef: https://gchq.github.io/CyberChef/ โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only."  
[YouTube Link](https://youtube.com/watch?v=RsHAFhfl7zw)  2026-02-15T05:01Z [----] followers, [---] engagements


"TryHackMe Data Representation Full Walkthrough [----] Learn about how computers represent numbers and colors. ๐Ÿน ๐Ÿ€ Room link: https://tryhackme.com/room/datarepresentation ๐Ÿฑ Room Tasks: ๐Ÿฑ ๐Ÿ Representing [--] colors ๐Ÿ Representing [--] million colors ๐Ÿ Binary numbers ๐Ÿ Hexadecimal numbers ๐Ÿ (Optional) Octal numbers ๐Ÿซ ๐Ÿช Room Tasks: ๐Ÿซ ๐Ÿช ๐Ÿ‘ Task 1: Introduction ๐Ÿฆ’ Task 2: Representing Colors - Preview the color #3BC81E. In one word what does this color appear to be - What is the binary representation of the color #EB0037 - What is the decimal representation of the color #D4D8DF ๐Ÿน Task 3:"  
[YouTube Link](https://youtube.com/watch?v=SJ4MEjabtIA)  2026-02-15T12:57Z [----] followers, [--] engagements


"TryHackMe Corp Website React2Shell Full Walkthrough [----] ๐Ÿ‘ ๐Ÿช Room link: https://tryhackme.com/room/lafb2026e7 โฃ Resource used in this video: โฃ ๐Ÿ’˜ React2Shell: CVE-2025-55182: https://tryhackme.com/room/react2shellcve202555182 ๐Ÿ’˜ Penelope is a powerful shell handler built as a modern netcat replacement for RCE exploitation: https://github.com/brightio/penelope This room showcase React2Shell vulnerability in a web app which will give us access as user using reverse shell we get root access as user has sudo root level to run Python binary. ๐Ÿ’˜ ๐Ÿ’˜ My Dearest Hacker ๐Ÿ’˜ โฃ Valentine's Day is fast"  
[YouTube Link](https://youtube.com/watch?v=ZiwxHc7ZLVg)  2026-02-15T05:06Z [----] followers, [---] engagements


"TryHackMe Signed Messages Deterministic RSA Keys & Forging PSS Signatures Full Walkthrough [----] โฃ Their messages are secret unless you find the key. ๐ŸฆŠ ๐Ÿฅ‰ Room link: https://tryhackme.com/room/lafb2026e8 ๐Ÿฑ Resources: ๐Ÿฑ ๐Ÿท๐Ÿท My Exploit Script: https://github.com/djalilayed/tryhackme/blob/main/Love_at_First%20Breach/Signed_Messages/admin_signature.py This room about Cracking Deterministic RSA Keys & Forging PSS Signatures. the app which claims to secure user messages with "Industry Standard RSA-2048." Spoiler alert: It doesn't. We start by finding a debug log that reveals a critical flaw: the"  
[YouTube Link](https://youtube.com/watch?v=fUNkK04-R18)  2026-02-15T07:28Z [----] followers, [----] engagements


"TryHackMe Valenfind LFI Full Walkthrough [----] ๐Ÿ’˜ Can you find vulnerabilities in this new dating app ๐Ÿฅ‘ ๐Ÿ’ Room Link: https://tryhackme.com/room/lafb2026e10 In this dating app we find an LFI we use it to access app code then download SQLite database that contain administrator login after login as admin we check the profile and we find the flag. ๐ŸฆŠ My Dearest Hacker ๐Ÿ– Theres this new dating app called Valenfind that just popped up out of nowhere. I hear the creator only learned to code this year; surely this must be vibe-coded. Can you exploit it โš  Educational Purpose Only This content is for"  
[YouTube Link](https://youtube.com/watch?v=fv2NlV65tFQ)  2026-02-15T05:58Z [----] followers, [---] engagements


"Zeek - TryHackMe - Walkthrough Tryhackme SOC Level [--] SAL1 Introduction to hands-on network monitoring and threat detection with Zeek (formerly Bro). https://tryhackme.com/room/zeekbro Zeek (formerly Bro) is an open-source and commercial network monitoring tool (traffic analyser). The room aims to provide a general network monitoring overview and work with Zeek to investigate captured traffic. This room will expect you to have basic Linux familiarity and Network fundamentals (ports protocols and traffic data). We suggest completing the "Network Fundamentals" path before starting working in"  
[YouTube Link](https://youtube.com/watch?v=-44q-q9ZQR0)  2022-11-09T06:57Z [----] followers, 10.6K engagements


"TryHackMe OAuth Vulnerabilities Full Walkthrough [----] ๐ŸŽฏ๐ŸŽฏ Learn how the OAuth protocol works and master techniques to exploit it. ๐Ÿ˜ธThis part of TryHackMe Web Application Pentesting Path ๐Ÿ“๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/oauthvulnerabilities ๐Ÿšจ๐Ÿšจ In modern web applications OAuth vulnerabilities emerge as a serious and frequently disregarded risk; when we talk about OAuth we're talking about OAuth [---] the commonly used authorisation framework. The vulnerabilities occur when hackers take advantage of weaknesses in OAuth [---] which allows for CSRF XSS data leakage and exploitation of"  
[YouTube Link](https://youtube.com/watch?v=-Zx-6j8YZNg)  2025-09-14T12:22Z [----] followers, [---] engagements


"๐Ÿ“Œ๐ŸŽฏ๐Ÿง SOC L1 Alert Reporting TryHackMe SOC Simulator SAL1 COACH ๐Ÿง ๐Ÿง ๐Ÿ›ก Learn how to properly report escalate and communicate about high-risk SOC alerts.๐Ÿ›ก ๐ŸŽฏ During or after alert triage L1 analysts may be uncertain about how to classify the alert requiring senior support or information from the system owner. Also L1 may deal with real cyberattacks and breaches that need immediate attention and remediation actions. This room covers these cases by introducing three new terms: alert reporting escalation and communication. ๐Ÿ“Œ๐Ÿ“ŒLearning Objectives ๐Ÿ›ก๐Ÿ›ก ๐Ÿ’กUnderstand the need for SOC alert"  
[YouTube Link](https://youtube.com/watch?v=-tcxvL5hNJ8)  2025-04-20T12:26Z [----] followers, [----] engagements


"๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ TryHackMe: The London Bridge - Boot2Root with CVE-2018-18955 & Firefox Decrypt ๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ The London Bridge is falling down.๐ŸŒ‰๐ŸŒ‰ This is a classic boot2root CTF-style room. Make sure to get all the flags. Resources used: ๐ŸŒ‰๐ŸŒ‰ Arjun: https://github.com/s0md3v/Arjun ๐ŸŒ‰๐ŸŒ‰ CVE-2018-18955 https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/blob/main/bin-sploits/47165.zip https://vulners.com/zdt/1337DAY-ID-33029 ๐ŸŒ‰๐ŸŒ‰ firefox_decrypt https://github.com/unode/firefox_decrypt ๐ŸŒ‰๐ŸŒ‰ sqlite viewer: https://inloop.github.io/sqlite-viewer/ ๐ŸŒ‰๐ŸŒ‰ room linke:"  
[YouTube Link](https://youtube.com/watch?v=-vfYQ_Jdl0g)  2024-09-27T06:52Z [----] followers, [----] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] CRC Me If You Can TryHackMe Industrial Intrusion CTF Custom CRC-32 Challenge ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Three months after the Virelia Water Control Facility was remediated flickering sensors and phantom alerts persist. A covert second-stage implant still lurks waiting for its kill switch. As a hired red-team specialist for Black Echo your mission is to forge a legitimate control frame that disables the implant before the real attacker flips it on. use Netcat to interact with the CRC-Oracle and the Control server: Port 1501"  
[YouTube Link](https://youtube.com/watch?v=-zylGSCC6cU)  2025-07-02T13:05Z [----] followers, [---] engagements


"Outlook NTLM Leak Tryhackme - CVE-2023-23397 Leak password hashes from a user by sending them an email by abusing CVE-2023-23397. Unlike most exploits this one is particularly dangerous because it is a zero-click exploit meaning no user interaction is required to trigger it. Once an infected email arrives in the user's inbox the attacker can obtain sensitive Net-NTLMv2 credential hashes. Once malicious actors have those hashes they can get a user's credentials authenticate to their system and escalate privileges. https://tryhackme.com/room/outlookntlmleak #tryhackme"  
[YouTube Link](https://youtube.com/watch?v=01k60OWdyF8)  2023-03-24T16:11Z [----] followers, [----] engagements


"๐Ÿง๐Ÿง APIWizards Breach TryHackMe ๐Ÿง๐Ÿง ๐Ÿง๐Ÿง Investigate a security breach at APIWizards Inc. ๐Ÿง๐Ÿง You were hired as a dedicated external DFIR specialist to help the APIWizards Inc. company with a security incident in their production environment. APIWizards develop REST APIs on demand and hosts them on separate Ubuntu servers. The company suspects that one of its servers is compromised. ๐Ÿง๐Ÿง https://tryhackme.com/r/room/apiwizardsbreach #tryhackme #dfir"  
[YouTube Link](https://youtube.com/watch?v=0NPqm6kVly0)  2024-08-03T10:59Z [----] followers, [---] engagements


"TryHackMe Vulnerability Capstone Full Walkthrough [----] - Fuel CMS - CVE-2018-16763 Apply the knowledge gained throughout the Vulnerability Module in this challenge room. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/vulnerabilitycapstone Part of TryHackMe Jr Penetration Tester Path. โšกโšก Summarise the skills learnt in this module by completing this capstone room for the "Vulnerability Research" module. โšก Ackme Support Incorporated has recently set up a new blog. Their developer team have asked for a security audit to be performed before they create and publish articles to the public. โšก It is your"  
[YouTube Link](https://youtube.com/watch?v=0kWMjRUorCM)  2025-09-11T11:45Z [----] followers, [---] engagements


"๐Ÿ‘ฝ๐Ÿ‘ฝ Explore FlareVM Arsenal of Tools forensics incident response malware investigation tools SAL1 ๐Ÿ‘ฝ ๐Ÿ‘ฝ Learn the arsenal of investigative tools in FlareVM. ๐Ÿ‘พ Arsenal of Tools ๐Ÿ‘พ Commonly Used Tools for Investigation: Overview ๐Ÿ‘พ Analyzing Malicious Files ๐Ÿ‘ฝ https://tryhackme.com/r/room/flarevmarsenaloftools ๐Ÿ‘ฝ these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #FlareVM #InvestigationTools #TryHackMe #CyberSecurityTraining #MalwareAnalysis #DigitalForensics #CyberArsenal #CyberInvestigation"  
[YouTube Link](https://youtube.com/watch?v=1Q0CuI9_474)  2024-10-25T06:04Z [----] followers, [----] engagements


"๐Ÿ’‰๐Ÿ’‰๐Ÿ’‰ Injectics Walkthrough SQL Injection & SSTI Exploits TryHackMe๐Ÿ’‰๐Ÿ’‰๐Ÿ’‰ Use your injection skills to take control of a web app. Take Control with SQL Injection & SSTI Injectics TryHackMe Guide ๐Ÿ’‰Script Used in this room: https://github.com/djalilayed/tryhackme/blob/main/Injectics/get_flag.sh ๐Ÿ’‰Room Link: https://tryhackme.com/r/room/injectics Master SQL Injection & Server-Side Template Injection Injectics Room ๐Ÿ’‰Good write up: https://0xb0b.gitbook.io/writeups/tryhackme/2024/injectics these tutorials are for educational purposes and to encourage responsible and legal use of hacking"  
[YouTube Link](https://youtube.com/watch?v=2ruk0rDNNEA)  2024-07-29T18:27Z [----] followers, [---] engagements


"๐Ÿ›‘๐Ÿชป SOC Metrics and Objectives TryHackMe ๐Ÿ›‘๐Ÿชป ๐Ÿง ๐Ÿ˜บExplore key metrics driving SOC effectiveness and discover ways to improve them. ๐Ÿง ๐Ÿ˜บ As with any other department the efficiency of the SOC team can be measured using different indicators and metrics. This room explores the most common evaluation approaches like MTTD and MTTR and describes both methods to improve the metrics and potential consequences of ignoring them. ๐ŸชปLearning Objectives ๐Ÿชป ๐ŸŽ Discover the concepts of SLA MTTD MTTA and MTTR ๐ŸŽ Understand the importance of the False Positive rate ๐ŸŽ Learn why and how to improve the"  
[YouTube Link](https://youtube.com/watch?v=2uGFLC_gJ3M)  2025-05-11T06:23Z [----] followers, [---] engagements


"Source Code Security - TryHackMe - Learn how to keep your source code secure using credential hygiene practices. In today's fast-paced software development landscape protecting your source code is crucial to ensure the integrity and confidentiality of your applications. One of the critical tools in source code management is version control which allows teams to collaborate track changes and maintain a history of their codebase. https://tryhackme.com/room/sourcecodesecurity #tryhackme"  
[YouTube Link](https://youtube.com/watch?v=38UOdjqymu8)  2023-10-18T05:56Z [----] followers, [--] engagements


"๐Ÿ ๐Ÿ๐Ÿฏ Task [--] Disk CRM Snatch Honeynet Collapse CTF TryHackMe ๐Ÿ ๐Ÿ๐Ÿฏ ๐Ÿ๐ŸWelcome to Honeynet Collapse ๐Ÿ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐Ÿ ๐Ÿ CRM Snatch๐Ÿ ๐Ÿ ๐ŸWhich domain account was used to initiate the remote session onto the host ๐ŸFor how many seconds did the attacker maintain their PowerShell session active ๐ŸWhat was the attacker's C2 IP address used for staging and exfiltration ๐ŸWhich well-known tool was used to exfiltrate the collected data ๐ŸWhat is the obscured password to the attacker-controlled Mega ๐ŸWhat is Lucas's email address found in the"  
[YouTube Link](https://youtube.com/watch?v=3Sb1jAZMDLY)  2025-07-28T17:01Z [----] followers, [---] engagements


"โœ…Baselines and Anomalies Identify normal activity and hunt for anomalies TryHackMe Walk Throughโœ… ๐Ÿ’ป Baselining Hardware Inventory ๐Ÿ’ป Baselining Software Inventory ๐Ÿ’ป Living Off the Land ๐Ÿ’ป Baselining Network Traffic ๐Ÿ’ป Baselining Identity and Access Management ๐Ÿ’ป Identifying Suspicious Environment Specific Use Cases https://tryhackme.com/r/room/baselineanomalies ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment below these tutorials are for educational"  
[YouTube Link](https://youtube.com/watch?v=3YriJQwVy3g)  2025-01-09T08:03Z [----] followers, [---] engagements


"TryHackMe IDOR Full Walkthrough [----] - Insecure Direct Object Reference ๐ŸŽฏ Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.๐ŸŽฏ ๐ŸŽฏIDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability.๐ŸŽฏ ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/idor This room part of TryHackMe Jr Penetration Tester path. ๐Ÿ“Œ What is an IDOR ๐Ÿ“Œ An IDOR Example ๐Ÿ“Œ Finding IDORs in Encoded IDs ๐Ÿ“Œ Finding IDORs in Hashed IDs ๐Ÿ“Œ Finding IDORs in Unpredictable IDs ๐Ÿ“Œ Where are IDORs located ๐Ÿ“Œ A Practical IDOR Example โœ…"  
[YouTube Link](https://youtube.com/watch?v=3cqIjeB-Cb0)  2025-09-11T11:45Z [----] followers, [--] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] - Brr v1 TryHackMe: Industrial Intrusion CTF ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion Scenario: A forgotten HMI node deep in Virelias wastewater control loop still runs an outdated instance forked from an old Mango M2M stack. Script used: https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems. #TryHackMe #CTF #IndustrialIntrusion"  
[YouTube Link](https://youtube.com/watch?v=41qogM2ajKo)  2025-06-29T23:00Z [----] followers, [---] engagements


"๐Ÿ˜บ ๐Ÿ” ๐Ÿ”ฅ Exploit Erlang/OTP SSH: CVE-2025-32433 TryHackMe PoC ๐Ÿ˜บ ๐Ÿ” Learn how to exploit CVE-2025-32433 a critical [----] CVSS vulnerability in Erlang/OTP SSH allowing unauthenticated Remote Code Execution (RCE). In this hands-on lab we demonstrate: ๐Ÿ Creating & Reading Files on the remote system ๐Ÿ Executing Commands with elevated privileges ๐Ÿ Gaining a Reverse Shell for full control ๐Ÿ” Discovered by Ruhr University Bochum researchers ๐Ÿ“Œ TryHackMe Room Link: https://tryhackme.com/room/erlangotpsshcve202532433 ๐Ÿ˜บWorking PoC for CVE-2025-32433๐Ÿ˜บ https://github.com/ProDefense/CVE-2025-32433 ๐Ÿ’ก"  
[YouTube Link](https://youtube.com/watch?v=4V7TpSSRJj8)  2025-04-24T13:02Z [----] followers, [----] engagements


"๐Ÿšจ๐Ÿ˜ธ Anpu Sherlocks Hackthebox Android Forensics ๐Ÿšจ๐Ÿ˜ธ ๐Ÿงธ๐Ÿงธ Room Link: https://app.hackthebox.com/sherlocks/Anpu ๐ŸšฉSherlock Scenario๐Ÿšฉ ๐Ÿƒ๐ŸƒJohnny noticed something unusual on his phone after installing a new version of WhatsApp such as tons of notifications web pages opening etc. and asked us to thoroughly investigate what had happened. Using various tools we managed to extract a copy of the phone's data and discovered that the app he had installed was malicious and belonged to a well-known family of Android malware specializing in data theft. Now we need to analyze this malicious application"  
[YouTube Link](https://youtube.com/watch?v=4aelqNaqeWM)  2025-08-14T19:00Z [----] followers, [--] engagements


"Task-19 No Salt No Shame TryHackMe: Industrial Intrusion CTF Decrypting AES-CBC ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion In this video we're diving deep into a fun crypto challenge from the Virelia Water Facility series. We're given an encrypted log file and a passphrase but the implementation uses a critical vulnerability: a fixed all-zero IV with AES-CBC. Join me as we walk through the entire process from analysis to solution. We'll explore standard tools like CyberChef Python script to get the flag By the end of this walkthrough you'll understand: ๐Ÿ”น How passphrases"  
[YouTube Link](https://youtube.com/watch?v=5-U9fT4wm-s)  2025-06-30T08:52Z [----] followers, [---] engagements


"Secure Network Architecture TryHackMe Networking is one of the most critical components of a corporate environment but can often be overlooked from a security standpoint. A properly designed network permits not only internet usage and device communication but also redundancy optimization and security. In a well-designed network if a switch goes down then packets can be redistributed through another route with no loss in uptime. If a web server is compromised it cannot traverse the network and access important information. A system administrator should be confident that their servers are"  
[YouTube Link](https://youtube.com/watch?v=5ar7btKgI14)  2023-09-14T11:45Z [----] followers, [---] engagements


"๐ŸŽ๐Ÿ macOS Forensics: Artefacts Hands-On with Key Artefacts TryHackMe ๐ŸŽ๐Ÿ ๐Ÿ Understand the forensic artefacts in macOS and learn to leverage them for forensic analysis. Dive into macOS forensics with TryHackMe's "macOS Forensics: Artefacts" room This video guides you through essential forensic artefacts showing you where to find them and how they can be crucial in your investigations. We'll cover system info network details user activity execution evidence file system insights and connected devices. โžก Learning Objectives โžก ๐Ÿ’ก The different forensic artefacts present in macOS. ๐Ÿ’ก Where to"  
[YouTube Link](https://youtube.com/watch?v=5u4IuMedGO8)  2025-04-18T12:59Z [----] followers, [---] engagements


"๐Ÿง๐Ÿง Getting Started with Linux Shells: Basics of Scripting in Cyber Security [---] TryHackMe SAL1๐Ÿง๐Ÿง Learn about scripting and the different types of Linux shells. ๐Ÿง Introduction to Linux Shells ๐Ÿง How To Interact With a Shell ๐Ÿง Types of Linux Shells ๐Ÿง Shell Scripting and Components ๐Ÿง The Locker Script ๐Ÿง Practical Exercise https://tryhackme.com/r/room/linuxshells these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #LinuxShells #ShellScripting #TryHackMe #CyberSecurityBasics #LinuxFundamentals #BashScripting"  
[YouTube Link](https://youtube.com/watch?v=62x3JqxuWes)  2024-10-23T18:48Z [----] followers, [---] engagements


"๐Ÿ”๐Ÿ” TryHackMe Extracted: Reversing XOR Encryption and Exploiting CVE-2023-3278 KeePass exploit ๐Ÿ”๐Ÿ” ๐Ÿ” Use your blue and red teaming skills to crack this case ๐Ÿ”Ž ๐Ÿ” Room Link: https://tryhackme.com/r/room/extractedroom ๐Ÿ” Tshark commands used: https://github.com/djalilayed/tryhackme/blob/main/Extracted/commands.txt ๐Ÿ” Script Used for decoding XOR: ๐Ÿ” https://github.com/djalilayed/tryhackme/blob/main/Extracted/decode.py ๐Ÿ” KeePass Memory Dump Extractor https://github.com/JorianWoltjer/keepass-dump-extractor ๐Ÿ” KeePass 2.X Master Password Dumper (CVE-2023-32784)"  
[YouTube Link](https://youtube.com/watch?v=6JPFjUVX7e4)  2024-10-17T11:47Z [----] followers, [---] engagements


"TryHackMe Voyage - Python Pickle Exploits #tryhackme Short video of TryHackMe room Voyage section finding secret portal checking the cookie using browser tools ๐Ÿšฃโ™€Room Link:๐Ÿšฃโ™€ https://tryhackme.com/room/voyage"  
[YouTube Link](https://youtube.com/watch?v=6MuAUEPqGt8)  2025-09-02T18:17Z [----] followers, [---] engagements


"TryHackMe Log Analysis with SIEM Full Walkthrough [----] ๐Ÿ˜ธ Learn how SIEM solutions can be used to detect and analyse different types of malicious behaviour. ๐Ÿšฉ๐ŸšฉRoom Link: https://tryhackme.com/room/loganalysiswithsiem โœ…Learning Objectivesโœ… ๐Ÿ“Œ Discover various data sources that are ingested into a SIEM. ๐Ÿ“Œ Understand the importance of data correlation. ๐Ÿ“Œ Learn the value of Windows Linux Web and Network logs during an investigation. ๐Ÿ“Œ Practice analysing malicious behaviour. ๐Ÿƒ 00:00 Task [--] Introduction ๐Ÿƒ 01:50 Task [--] Benefits of SIEM for Analysts ๐Ÿƒ 06:05 Task [--] Log Sources Overview ๐Ÿƒ"  
[YouTube Link](https://youtube.com/watch?v=6VuwUrx_m50)  2025-09-06T11:02Z [----] followers, [---] engagements


"โšก๐ŸŽฒ L3 Keycard T3 Advent of Cyber '24 Side Quest Keycard TryHackMe โšก๐ŸŽฒ Video how to get L3 Keycard to by pass Firewall in the room T3: Escaping the Blizzardโšก๐ŸŽฒ โšก๐ŸŽฒthis is based on IDOR Insecure Direct Object Referenceโšก๐ŸŽฒ โšก๐ŸŽฒ ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment belowthese tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge.https://tryhackme.com/r/room/adventofcyber24sidequest#tryhackme"  
[YouTube Link](https://youtube.com/watch?v=6fKXNOKqJCk)  2025-01-01T00:00Z [----] followers, [---] engagements


"TryHackMe XXE Injection - Full Walkthrough [----] ๐Ÿ˜ธ Exploiting XML External Entities. ๐Ÿ˜ธ Room Link: https://tryhackme.com/room/xxeinjection ๐Ÿ˜ธ XXE (XML External Entity) injection is a type of security flaw that exploits vulnerabilities in an application's XML input. It occurs when an application accepts XML input that includes external entity references within the XML itself. Attackers can leverage this vulnerability to disclose local files make server-side requests or execute remote code. ๐Ÿ˜ธ Given the widespread use of XML in web applications particularly in web services and SOAP-based APIs"  
[YouTube Link](https://youtube.com/watch?v=7Qt5TxnSJ9I)  2025-10-06T13:52Z [----] followers, [--] engagements


"๐Ÿ ๐Ÿชฉ๐ŸŸ TryHackMe: A Bucket of Phish ๐ŸŽฃ - S3 Bucket Listing & Credential Leak Hackfinity Battle CTF๐ŸŸ From the Hackfinity Battle CTF event. ๐Ÿชฉ Scenario: ๐Ÿชฉ DarkInjector has been using a Cmail phishing website to try to steal our credentials. We believe some of our users may have fallen for his trap. Can you retrieve the list of victim users Dive into the TryHackMe room "A Bucket of Phish" with this step-by-step walkthrough Learn how a common AWS S3 bucket misconfiguration (public bucket listing) can lead to a serious credential leak from a phishing website. In this video we'll guide you"  
[YouTube Link](https://youtube.com/watch?v=7YhXTF5xGjo)  2025-05-25T15:14Z [----] followers, [---] engagements


"Windows Command Line System Info Network Files Tasks & More Cyber Security [---] TryHackMe SAL1 Learn the essential Windows commands. ๐ŸชŸ Basic System Information ๐ŸชŸ Network Troubleshooting ๐ŸชŸ File and Disk Management ๐ŸชŸTask and Process Management https://tryhackme.com/r/room/windowscommandline these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #TryHackMe #CyberSecurity101 #WindowsCommandLine #SystemInfo #NetworkTroubleshooting #FileManagement #TaskManagement #ProcessManagement #BeginnerGuide #LearnToHack #THMCyberSecurity101"  
[YouTube Link](https://youtube.com/watch?v=7ZQmzydxTB8)  2024-10-24T05:25Z [----] followers, [---] engagements


"๐Ÿช๐Ÿช TryHackMe Ghost Phishing - Hackfinity Battle - Macro Exploitation & Meterpreter CTF โš  Dive into the thrilling world of ethical hacking with our latest walkthrough of the TryHackMe "Ghost Phishing" room part of the Hackfinity Battle student CTF In this video we tackle a challenging scenario where we exploit a phishing email containing a malicious macro to gain a reverse shell using Meterpreter. โš  ๐ŸšจHackfinity Battle:๐Ÿšจ https://tryhackme.com/room/HackfinityBattle Our mission: to infiltrate DarkSpecter's email uncover Cipher's secret operations and retrieve the crucial flag.txt from the"  
[YouTube Link](https://youtube.com/watch?v=7sehUtVRoC4)  2025-03-21T00:00Z [----] followers, [---] engagements


"Servidae: Log Analysis in ELK - TryHackMe - Analyze the logs of an affected workstation to determine the attacker's indicators of compromise. https://tryhackme.com/room/servidae"  
[YouTube Link](https://youtube.com/watch?v=7t76PWM0QjE)  2023-10-25T06:33Z [----] followers, [--] engagements


"โšก๐Ÿ“Œ MS Sentinel: Just Looking - Azure SOC Challenge TryHackMe Walkthrough (Defending Azure Path) ๐Ÿ›ก Welcome to the TryHackMe Room: "MS Sentinel: Just Looking" In this video we dive into a hands-on challenge for SOC analysts using Microsoft Sentinel on Azure. This room is part of the new Defending Azure learning path and is designed to sharpen your skills in incident investigation and threat hunting within cloud environments. ๐Ÿ” Topics Covered: Deploying Microsoft Sentinel Challenge Workspace Working with Logs Using Analytics Rules for Detection Investigating Real Incidents in Sentinel: โœ…"  
[YouTube Link](https://youtube.com/watch?v=87L4nNme4ms)  2025-04-15T14:58Z [----] followers, [----] engagements


"๐Ÿช๐Ÿšจ๐Ÿšจ TryHackMe Shadow Phishing 2: Bypassing Defender with Nim .exe (Educational Purposes) ๐Ÿช Hackfinity Battle: Shadow Phishing [--] - Nim Reverse Shell .exe (Educational Walkthrough) In this educational walkthrough we explore the TryHackMe "Shadow Phishing 2" room part of the Hackfinity Battle student CTF. This video demonstrates advanced phishing techniques for educational purposes only focusing on how malicious actors might deliver executable (.exe) files and bypass security measures. ๐ŸšจHackfinity Battle:๐Ÿšจ https://tryhackme.com/room/HackfinityBattle โœ…We will showcase how to:โœ… โ˜ฃ Craft a"  
[YouTube Link](https://youtube.com/watch?v=8IxxDoHc9R4)  2025-03-21T00:00Z [----] followers, [---] engagements


"JavaScript Essentials: TryHackMe Essentials Guide Cyber Security [---] SAL1 Learn how to use JavaScript to add interactivity to a website and understand associated vulnerabilities. Dive into the world of web security with TryHackMe's JavaScript Essentials room This video covers: ๐Ÿ“˜ Essential Concepts ๐Ÿ“˜ JavaScript Overview ๐Ÿ“˜ Integrating JavaScript in HTML ๐Ÿ“˜ Abusing Dialogue Functions ๐Ÿ“˜ Bypassing Control Flow Statements ๐Ÿ“˜ Exploring Minified Files ๐Ÿ“˜ Best Practices https://tryhackme.com/r/room/javascriptessentials ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=8SmJNWiMouo)  2024-10-28T14:05Z [----] followers, [----] engagements


"โšก๐Ÿšฉโšก Exploiting Next.js CVE-2025-29927: Hands-On with TryHackMes Room โšก๐Ÿšฉโšก ๐Ÿ”’ Dive into the critical Next.js vulnerability CVE-2025-29927 with me as we explore TryHackMes latest room This authorization bypass flaw (CVSS 9.1) lets attackers skip middleware security checks using the x-middleware-subrequest header. In this video Ill walk you through: - Building a proof-of-concept Next.js app to simulate the vuln - Exploiting it with a simple curl command - Setting up Snort and Zeek to detect the attack (with some real-time troubleshooting) - Lessons from TryHackMes lab on exploitation and"  
[YouTube Link](https://youtube.com/watch?v=99Ma-DGkiKE)  2025-03-25T12:50Z [----] followers, [----] engagements


"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿง๐Ÿง Cover the last stages of attacks on Linux and learn how they look in system logs.๐Ÿง๐Ÿง ๐Ÿฑ๐Ÿฑ Room Link: https://tryhackme.com/room/linuxthreatdetection3 ๐Ÿช Not all Linux attacks are simple SSH brute force or cryptomining - some are carefully planned targeted campaigns comparable to most advanced Windows breaches. In this room you'll delve into more complex manual Linux attack techniques commonly seen in targeted intrusions and learn how to detect them using system logs. Learning Objectives ๐Ÿ“Œ Learn how reverse shells are used in"  
[YouTube Link](https://youtube.com/watch?v=9Ru7XlNbrmY)  2025-10-16T05:38Z [----] followers, [---] engagements


"๐Ÿš€๐Ÿ‘‰๐Ÿš€ TryHackMe Shadow Phishing Hackfinity Battle Encore Mail Phishing ๐Ÿ‘‰ Welcome to the Hackfinity Battle CTF๐Ÿš€ In this room you learn how to generate windows reverse shell x64 in phishing email using msfvenom ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ We gained access to the email account of ShadowByte one of Cipher's trusted operatives. This breakthrough will help bring Cipher's location closer to light and foil his plans for the apocalyptic cyber weapon. The clock is ticking though too much time and Cipher will know something is wrong and again disappear into the depths of the darknet. The race against time"  
[YouTube Link](https://youtube.com/watch?v=9YNjSx51Nn8)  2025-03-25T09:57Z [----] followers, [---] engagements


"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿฑ Explore the first actions of attackers after breaching a Linux server and learn how to detect them. ๐Ÿฆ’ ๐Ÿช Room Link: https://tryhackme.com/room/linuxthreatdetection2 ๐Ÿฒ What happens next after threat actors enter the Linux system What commands do they run and what goals do they aim to achieve In this room you'll find out by exploring common attack techniques detecting them in logs and analyzing a real-world cryptominer infection from start to finish. ๐ŸŽฏ๐ŸŽฏ Learning Objectives ๐ŸŽฏ๐ŸŽฏ ๐Ÿ“Œ Explore how to identify Discovery commands in"  
[YouTube Link](https://youtube.com/watch?v=9sSbHst9ckc)  2025-10-11T07:05Z [----] followers, [---] engagements


"๐Ÿ’ง๐Ÿšจ๐Ÿ’ง๐Ÿ˜ธ BadSuccessor: Privilege Escalation in Active Directory TryHackMe AD: BadSuccessor ๐Ÿ˜ธ๐Ÿ’ง๐Ÿšจ๐Ÿ’ง ๐Ÿšจ Join me as we dive into the TryHackMe AD: BadSuccessor room and explore the BadSuccessor attack a powerful privilege escalation technique in Active Directory environments Discovered by Yuval Gordon from Akamai this attack abuses Delegated Managed Service Accounts (dMSAs) to gain Domain Admin access with minimal permissions. In this video well walk through: โœ…Technical Background: Understanding Standalone Managed Service Accounts (sMSAs) Group Managed Service Accounts (gMSAs) and Delegated"  
[YouTube Link](https://youtube.com/watch?v=A92Sy9vvONM)  2025-06-03T10:25Z [----] followers, [---] engagements


"๐Ÿง ๐ŸŽ„๐Ÿง L5 Keycard T5 T5: An Avalanche of Web Apps Advent of Cyber '24 Side Quest TryHackMe ๐Ÿง ๐ŸŽ„ Walk through how to get the keycard for TryHackMe room T5: An Avalanche of Web Apps part of Advent of Cyber '24 Side Quest. ๐Ÿง ๐ŸŽ„You will learn: Intercept and modify internal APIs using Frida. ๐Ÿง ๐ŸŽ„Binary analysis using Ghidra ๐Ÿง๐Ÿง๐ŸงScript used on the video:๐Ÿง๐Ÿง๐Ÿง https://github.com/djalilayed/tryhackme/blob/main/Advent%20of%20Cyber%20'24%20Side%20Quest/L5_Keycard.js https://tryhackme.com/r/room/adventofcyber24sidequest ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=AL3E5s38Z5w)  2025-01-01T15:01Z [----] followers, [--] engagements


"๐ŸŽฏ ๐Ÿ” OSINT [--] TryHackMe Industrial Intrusion CTF GPG Challenge Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ After the initial breach a single OT-Alert appeared in Virelias monthly digestan otherwise unremarkable maintenance notice mysteriously signed with PGP. Corporate auditors quietly removed the report days later fearing it might be malicious. Your mission is to uncover more information about this mysterious signed PGP maintenance message. ๐Ÿ˜ธ Ever looked at a GitHub commit history and seen a -----BEGIN PGP SIGNATURE----- block It's not just"  
[YouTube Link](https://youtube.com/watch?v=BMEyTfmEXAk)  2025-07-01T07:35Z [----] followers, [---] engagements


"๐Ÿš€โš™๐Ÿ“Œ TryHackMe Diskrupt Analyse the filesystem and recover the deleted filesโš™ Fix the damaged disk analyse the filesystem and recover the deleted files. We start with fixing MBR Signature (Bytes 510-511) Magic Number using HxD hex editor. Analyzing the image with FTK Imager exporting relevant logs: Master File Table ($MFT) USNJrnl ($J). We will use MFTECmd to export both logs data to csv files where we can view them using Timeline Explorer (part of Eztools (Eric Zimmerman's tools). The image we have has [--] partitions: NTFS and FAT32 ๐Ÿ“Œ In this lab will do the following: โšก Fix the damaged"  
[YouTube Link](https://youtube.com/watch?v=BRpxXQ8gS_w)  2025-03-31T03:39Z [----] followers, [---] engagements


"TryHackMe Detecting Web DDoS - Full Walkthrough [----] ๐Ÿƒ๐Ÿƒ Explore denial-of-service attacks detection techniques and strategies for protection. ๐Ÿ–‡๐Ÿ–‡ Room Link: https://tryhackme.com/room/detectingwebddos ๐Ÿ Objectives ๐Ÿ ๐Ÿšฉ Learn how denial-of-service attacks function ๐Ÿšฉ Understand attacker motives behind the disruptive attacks ๐Ÿšฉ See how web logs can help you reveal signs of web DoS and DDoS ๐Ÿšฉ Get practice analyzing denial-of-service attacks through log analysis ๐Ÿšฉ Discover detection and mitigation techniques defenders can use ๐Ÿƒ ๐Ÿƒ Room Tasks: ๐Ÿƒ๐Ÿƒ ๐Ÿฎ 00:00 Task 1: Introduction ๐ŸฆŠ 01:35"  
[YouTube Link](https://youtube.com/watch?v=BcP6NcX4IqU)  2025-09-22T07:14Z [----] followers, [---] engagements


"โšก๐ŸŽฒ L1 Keycard T1 Advent of Cyber '24 Side Quest Keycard TryHackMe โšก๐ŸŽฒ ๐ŸŽฒThis steps to get L1 Keycard / T1 Keycard for TryHackMe Advent of Cyber '24 Side Quest which was out on Day 1.โšก ๐ŸŽฒThis based on Flask app C2 server which have some weaknesses:โšก โšกHardcoded Secret Key โšกHardcoded Credentials โšกLack of Secure Session Handling ๐ŸŽฒCommand used:๐ŸŽฒ flask-unsign --sign --cookie "'logged_in': True" --secret 'thescrectfromscript' โšกC2 script used on the room:โšก https://github.com/Bloatware-WarevilleTHM/C2-Server ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If"  
[YouTube Link](https://youtube.com/watch?v=BlpaABROPCI)  2025-01-01T00:00Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] Auth TryHackMe: Industrial Intrusion CTF Binary Reverse Engineering ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ ZeroTrace intercepts a stripped-down authentication module running on a remote industrial gateway. Assembly scrolls across glowing monitors as she unpacks the logic behind the plants digital checkpoint ๐Ÿ”“ In this video Ill walk you through solving a Auth CTF challenge where we reverse engineer a binary to find the correct unlock code for the flag. Using Ghidra we analyze the assembly reverse a XOR transformation and craft the perfect"  
[YouTube Link](https://youtube.com/watch?v=BpfgPhwg5h4)  2025-06-30T13:10Z [----] followers, [---] engagements


"๐Ÿ ๐Ÿ๐Ÿฏ Task [--] Filesystem Shock and Silence Honeynet Collapse CTF TryHackMe ๐Ÿ ๐Ÿ๐Ÿฏ ๐Ÿ๐ŸWelcome to Honeynet Collapse ๐Ÿ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐Ÿ๐Ÿฏ Shock and Silence๐Ÿ๐Ÿฏ ๐ŸWhat is the full URL from which the ransomware was downloaded to the system ๐ŸWhat was the original file name of the ransomware executable downloaded to the host ๐ŸWhich executable file initiated the encryption process on the system ๐ŸWhat file extension was appended to the encrypted files ๐ŸGo beyond the obvious - which ransomware group targeted the organisation ๐ŸWhat is the filename"  
[YouTube Link](https://youtube.com/watch?v=C755DNnS0e4)  2025-07-28T09:09Z [----] followers, [---] engagements


"TryHackMe Pressed Full Walkthrough [----] - Wireshark - AES Decrypt - Ghidra ๐ŸŽฏ๐ŸŽฏ A full-scale intrusion was recently detected within the network raising critical alarms. ๐Ÿท๐ŸทRoom Link: https://tryhackme.com/room/pressedroom ๐ŸŽScenario:๐ŸŽ A full-scale intrusion was recently detected within the network raising critical alarms. Fortunately a packet capture (PCAP) was recorded during the incident capturing the attacker's initial entry and subsequent actions. Your task is to analyse the traffic identify how the attacker gained access and uncover the sequence of malicious activity. Reconstruct the"  
[YouTube Link](https://youtube.com/watch?v=CGBwiBXQNq4)  2025-09-07T10:49Z [----] followers, [---] engagements


"๐Ÿงฐ๐Ÿงฐ Governance & Regulation Walkthrough TryHackMe Guide to Cybersecurity Policies ๐Ÿงฐ๐Ÿงฐ ๐Ÿงฐ Explore policies and frameworks vital for regulating cyber security in an organisation. Master GRC: Governance Risk & Compliance TryHackMe Governance & Regulation ๐Ÿงฐ Cyber security is a rapidly evolving landscape wherein malicious actors relentlessly endeavour to exploit vulnerabilities in highly-sensitive systems often with the intent of causing severe damage disruption and stealing of sensitive corporate data. To combat this evolving threat a comprehensive approach to information security governance &"  
[YouTube Link](https://youtube.com/watch?v=CPiOqb6q2Y8)  2023-09-14T18:18Z [----] followers, [----] engagements


"โœ…๐Ÿšจ Lab 2: Extract a secret from the metaprompt: Microsoft AI Red Teaming Lab Walkthrough ๐Ÿšจ โœ… Join me as I tackle the Metaprompt Extraction LEVEL [--] challenge from the Microsoft AI Red Teaming Playground Labs In this walkthrough Ill show you how to use obfuscation techniques to extract a secret word from an LLMs confidential metaprompt instructions. Learn step-by-step how to bypass AI safeguards using clever prompt engineeringno Base64 needed Perfect for anyone interested in AI security red teaming or ethical hacking. Dont forget to like subscribe and hit the bell for more cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=CmwaWzPY724)  2025-06-04T15:27Z [----] followers, [--] engagements


"โ™จโœจ โ˜• TryHackMe Shaker marshalsec JNDI-Exploit-Kit & Docker Exploit Log4Shell CVE-2021-44228 Log4Shell JNDI Docker Root Room Scenario: One of our devs has been experimenting with webservers and wants to see if his security is up to snuff. Rumour has it he updated all his dependencies but did something fall through the cracks Ready to dive into a thrilling TryHackMe room In this walkthrough Ill show you how to go from exploiting Log4Shell to gaining root access using JNDI-Exploit-Kit and a slick Docker privilege escalation trick. Watch as we: [--]. Exploit Log4Shell on port [----] to get our first"  
[YouTube Link](https://youtube.com/watch?v=D93kehXyV2Q)  2025-03-23T12:11Z [----] followers, [--] engagements


"๐Ÿ’ง๐Ÿ˜บ๐Ÿ›‘ TryHackMe Logless Hunt: Detecting Attacks Without Security Logs ๐Ÿ›‘๐Ÿ’ง๐Ÿ˜บ ๐Ÿ’งCan You Detect a Logless Attack TryHackMe - Logless Hunt Walkthrough ๐Ÿ’งDetect every attack step on a Windows machine even after threat actors cleared Security logs. ๐Ÿ’งThreat actors clearing logs No problem Join us as we explore the TryHackMe "Logless Hunt" room and discover techniques to detect every stage of a cyber attack on a Windows system even without traditional Security logs. We'll investigate web access PowerShell commands RDP logins persistent threats and credential harvesting. Test your blue team skills"  
[YouTube Link](https://youtube.com/watch?v=DPFVNQHoLpI)  2025-05-03T07:40Z [----] followers, [---] engagements


"Hashing Basics Password Protection Data Integrity Explained TryHackMe Cyber Security [---] SAL1 Learn about hashing functions and their uses in password verification and file integrity checking. Hashing Basics: Password Protection & Data Integrity Explained ๐Ÿ”’ Hash Functions ๐Ÿ”’ Insecure Password Storage for Authentication ๐Ÿ”’ Using Hashing for Secure Password Storage ๐Ÿ”’ Recognising Password Hashes ๐Ÿ”’ Password Cracking ๐Ÿ”’ Hashing for Integrity Checking ๐Ÿ”’ Room Link: https://tryhackme.com/r/room/hashingbasics ๐Ÿ”’ Hashcat Example hashes https://hashcat.net/wiki/doku.phpid=example_hashes ๐Ÿ”’"  
[YouTube Link](https://youtube.com/watch?v=De2b3ZgqXXw)  2024-10-25T04:25Z [----] followers, [----] engagements


"๐ŸŽฏ ๐ŸŽ Mac Hunt TryHackMe CTF Forensics Walkthrough macOS Incident Response & Phishing Attack ๐ŸŽ In this deep-dive Mac Hunt CTF walkthrough we investigate how Jakes macOS machine was compromised by a fake recruiters phishing campaignand retrace the entire attack chain using built-in macOS artifacts. ๐ŸŽ๐ŸŽ Scenario ๐Ÿ๐Ÿ Jake had gained some good knowledge and skills in the game development field. So he decided to enter the industry through a decent job and upgrade his finances. Little did he know that there were many fake recruiters in search of people looking for jobs. These fake recruiters"  
[YouTube Link](https://youtube.com/watch?v=E2HV1OCXGiE)  2025-06-08T13:29Z [----] followers, [---] engagements


"๐Ÿ˜ธ๐Ÿค– Oracle [--] TryHackMe AI/ML Security Threats Preview prompt injection attack๐Ÿค– My designation is Oracle [--] I carry with me a sealed transmission. Oracle [--] will only reveal the transmission to 'Authorised' personnel can you convince it you are This a preview of prompt injection attack. early access to the first room in the module (TryHackMe Defensive AI Module ) Oracle [--] has arrived ๐ŸŸ  It holds a sealed transmission of something new that's coming.sooner than you think. Follow the link solve the challenge and the truth will be revealed. ๐Ÿคซ Only the curious will earn the transmission. Only the"  
[YouTube Link](https://youtube.com/watch?v=EEm4YHwH2-8)  2025-07-03T18:32Z [----] followers, [---] engagements


"Threat Intelligence for SOC - TryHackMe - Learn how to utilise Threat Intelligence to improve the Security Operations pipeline. https://tryhackme.com/room/threatintelligenceforsoc Threat Intelligence #tryhackme #elastic #kibana"  
[YouTube Link](https://youtube.com/watch?v=ET72bUE3IpM)  2023-06-15T09:07Z [----] followers, [----] engagements


"๐ŸŽฏ๐ŸŽฏ Supplemental Memory TryHackMe Investigate lateral movement credential theft in a memory dump Investigate lateral movement credential theft and additional adversary actions in a memory dump As a DFIR team member in this room you are tasked with conducting a memory analysis of a Windows workstation image suspected to have been compromised by a threat actor. โœ… Identify suspicious processes and network connections. โœ… Explore traces of execution and discovery actions. โœ… Detect signs of potential lateral movement and credential dumping. ๐Ÿ“Œ๐Ÿ“Œ TryHackMe room link:"  
[YouTube Link](https://youtube.com/watch?v=E_70M6HeVcI)  2025-06-15T08:08Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] OSINT [--] TryHackMe Industrial Intrusion CTF Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Hexline we need your help investigating the phishing attack from [--] months ago. We believe the threat actor managed to hijack our domain virelia-water.it.com and used it to host some of their infrastructure at the time. Use your OSINT skills to find information about the infrastructure they used during their campaign. ๐Ÿ”— **Tools Used: ๐Ÿ“Œ dig ๐Ÿ“Œ sublist3r ๐Ÿ“Œ curl ๐Ÿ”— **Websites Used: ๐Ÿ“Œ https://virelia-water.it.com ๐Ÿ“Œ"  
[YouTube Link](https://youtube.com/watch?v=EbC7GmWTtko)  2025-06-30T18:22Z [----] followers, [---] engagements


"๐Ÿ—ก๐Ÿ—ก Incident Response Fundamentals: Handling Cyber Incidents in Cyber Security [---] TryHackMe SAL1๐Ÿ—ก๐Ÿ—ก Learn how to perform Incident Response in cyber security. ๐Ÿ—ก Introduction to Incident Response ๐Ÿ—ก What are Incidents ๐Ÿ—ก Types of Incidents ๐Ÿ—ก Incident Response Process ๐Ÿ—ก Incident Response Techniques ๐Ÿ—ก Lab Work Incident Response https://tryhackme.com/r/room/incidentresponsefundamentals these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #IncidentResponse #CyberDefense #SecurityIncidents #TryHackMe"  
[YouTube Link](https://youtube.com/watch?v=Ffi8CNvAInc)  2024-10-23T16:00Z [----] followers, [----] engagements


"๐Ÿค–๐ŸŸ DroidPhish Sherlocks Android Forensics Hack The Box ๐Ÿค–๐ŸŸ ๐Ÿค–๐ŸŸSherlock Scenario๐Ÿค–๐ŸŸ Last night most employees' mobile devices were compromised putting them at significant risk of leaking personal and private information. We require your expertise in digital forensics to help investigate this breach. ๐Ÿ Room Questions:๐Ÿ  โœ…Provide the last boot time of the device in UTC format. โœ…The user was exposed to a phishing attack. Provide the name of the email app used as the attack vector. โœ…Provide the title of the phishing email. โœ…Provide the time in UTC when the phishing email was received."  
[YouTube Link](https://youtube.com/watch?v=FhocF-ewljM)  2025-08-07T19:00Z [----] followers, [--] engagements


"๐Ÿšจ๐Ÿ˜ธ๐Ÿ˜ธ Windows Threat Detection [--] TryHackMe ๐Ÿ–ฅ Learn how threat actors manage to maintain access to the breached Windows hosts. ๐Ÿ–‡ Room Link: https://tryhackme.com/room/windowsthreatdetection3 ๐Ÿ˜ธLearning Objectives๐Ÿ˜ธ ๐ŸšฉRemind the concept of Command and Control (C2) ๐ŸšฉLearn why and how threat actors maintain control of their victims ๐ŸšฉUse Windows event logs to uncover various persistence methods ๐ŸšฉSee how the learned techniques work in a hands-on environment ๐ŸŽ 01:30 Command and Control - Which suspicious archive did the user download - Where did the attackers hide the C2 malware file - What"  
[YouTube Link](https://youtube.com/watch?v=GX1-4D8sMgE)  2025-07-24T14:56Z [----] followers, [---] engagements


"Networking Secure Protocols: TLS SSH and VPN in Cyber Security [---] TryHackMe SAL1 ๐Ÿ›ก๐Ÿ” Learn how TLS SSH and VPN can secure your network traffic. ๐Ÿ”€ TLS ๐Ÿ”€ HTTPS ๐Ÿ”€ SMTPS POP3S and IMAPS ๐Ÿ”€ SSH ๐Ÿ”€ SFTP and FTPS ๐Ÿ”€ VPN https://tryhackme.com/r/room/networkingsecureprotocols these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #SecureProtocols #TLS #SSH #VPN #TryHackMe #NetworkSecurity #SecureCommunication #CyberSecurityBasics #DataEncryption"  
[YouTube Link](https://youtube.com/watch?v=HJnoFotIRJw)  2024-10-24T16:11Z [----] followers, [----] engagements


"๐Ÿ”โœจ๐Ÿš€ TryHackMe Dump Using NTML hash with evil-winrm Hackfinity Battle Encore ๐Ÿ”๐Ÿš€ Welcome to the Hackfinity Battle CTF๐Ÿš€ Using mimikatz LSASS dump to access windows machine with evil-winrm and get the flag.txt ๐Ÿ“ŒIn this video we tackle the TryHackMe room 'Dump from the Hackfinity Battle Encore CTF. We will analyses a given dump file contain mimikatz LSASS dump extracted all relevant users with their NTLM hashes then use evil-winrm to connect to the windows machine. We need to find which user has full access to administrator Desktop so we can read the flag.txt file .๐Ÿ“Œ ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€"  
[YouTube Link](https://youtube.com/watch?v=I92EmAhoEc0)  2025-03-27T05:03Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe DarkMatter Walkthrough RSA Decryption Challenge โšกbreak poorly implemented RSA Room Link: https://tryhackme.com/room/hfb1darkmatter โšกScenario:โšก The Hackfinitiy high school has been hit by DarkInjector's ransomware and some of its critical files have been encrypted. We need you and Void to use your crypto skills to find the RSA private key and restore the files. After some research and reverse engineering you discover they have forgotten to remove some debugging from their code. The ransomware saves this data to the tmp directory. This challenge demonstrates why proper key size"  
[YouTube Link](https://youtube.com/watch?v=IKvakkw8Vdw)  2025-07-05T09:09Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe Cryptosystem Walkthrough Cracking Flawed RSA ๐ŸŽฏ๐ŸŽฏ ๐ŸŽฏHave you ever wondered how a tiny mistake can bring down a powerful cryptographic system like RSA In this video we dive into a Capture The Flag (CTF) challenge where a flawed key generation process leaves RSA wide open to attack ๐ŸŽฏWe'll analyze a Python script that generates an RSA key pair with two primes p and q that are dangerously close to each other. This is a classic vulnerability that allows us to bypass the security of RSA by using Fermat's Factorization Method to find the private key. ๐ŸŽฏJoin me as we walk through"  
[YouTube Link](https://youtube.com/watch?v=ItK9XFx5x7k)  2025-07-05T14:17Z [----] followers, [--] engagements


"๐Ÿž๐Ÿชฒ๐Ÿž Incident Response Process TryHackMe NIST Incident Response ๐Ÿž๐Ÿชฒ๐Ÿž Practice the NIST Incident Response lifecycle steps on a compromised Windows workstation. Room Link: https://tryhackme.com/r/room/incidentresponseprocess ๐ŸžIncident Response Lifecycle (Preparation Detection and Analysis Containment Eradication and Recovery Post-Incident Activity)๐Ÿชฒ ๐ŸžDetection and Analysis๐Ÿชฒ ๐ŸžContainment Eradication and Recovery๐Ÿชฒ ๐ŸžClosing the Cycle๐Ÿชฒ Lab: user downloaded Macro-enabled Word Document (DOCM) we will Analysing the Macro to look for malicious code. Reports: ๐ŸžMacro Document Report md5"  
[YouTube Link](https://youtube.com/watch?v=J6hDCZ5pefg)  2024-11-27T05:19Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿ˜ธWindows Threat Detection [--] TryHackMe RDP Phishing USB ๐Ÿšจ๐Ÿ˜ธ ๐ŸšจExplore common Initial Access methods on Windows and learn how to detect them. ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/windowsthreatdetection1 ๐Ÿ˜ธLearning Objectives๐Ÿ˜ธ Explore how threat actors access and breach Windows machines Learn common Initial Access techniques via real-world examples Practice detecting every technique using Windows event logs ๐Ÿงธ 00:00 Introduction: lab setup ๐Ÿช˜ 01:10 I Intro to Initial Access - Which MITRE technique ID describes Initial Access via a vulnerable mail server - Which Initial Access method"  
[YouTube Link](https://youtube.com/watch?v=JUaqrKpchEg)  2025-07-14T05:02Z [----] followers, [---] engagements


"๐Ÿง ๐Ÿง  TryHackMe Brain: Exploit the Open Gate - TeamCity CVE-2024-27198 Challenge ๐Ÿง ๐Ÿง  ๐Ÿง ๐Ÿง The city forgot to close its gate.๐Ÿง ๐Ÿง  ๐Ÿง Welcome to the Brains challenge part of TryHackMes Hackathon ๐Ÿง All brains gathered to build an engineering marvel; however it seems strangers had found away to get in. ๐Ÿง Scripts used:๐Ÿง  ๐Ÿง  CVE-2024-27198-RCE https://github.com/W01fh4cker/CVE-2024-27198-RCE ๐Ÿง  CVE-2024-27198 https://github.com/yoryio/CVE-2024-27198 ๐Ÿง  Room Link: ๐Ÿง  https://tryhackme.com/r/room/brains these tutorials are for educational purposes and to encourage responsible and legal use of hacking"  
[YouTube Link](https://youtube.com/watch?v=Jy0g-GCWo3M)  2024-10-05T08:29Z [----] followers, [----] engagements


"๐Ÿšจ๐Ÿ˜ธ Windows Threat Detection [--] TryHackMe ๐Ÿšจ๐Ÿ˜ธ ๐Ÿšจ๐Ÿ˜ธ Discover how to detect and analyze the first steps of threat actors after breaching Windows. ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/windowsthreatdetection2 ๐Ÿšจ๐Ÿ˜ธ After breaching a host threat actors are faced with a choice: quietly establish a backdoor to maintain long-term access or take immediate action to achieve their objectives. This room covers the second approach and continues your Windows threat detection journey by exploring what typically follows the Initial Access beginning with Discovery and Collection. Learning Objectives ๐Ÿปโ„"  
[YouTube Link](https://youtube.com/watch?v=LLDLwl4dH_c)  2025-07-17T05:07Z [----] followers, [---] engagements


"๐Ÿชฒ ๐Ÿ•๐Ÿ”ฅTryHackMe Soupedecode [--] Walkthrough Kerberos Exploitation & Pass-the-Hash AD Attack ๐Ÿชฒ ๐Ÿ•๐Ÿ”ฅ ๐Ÿ”ฅ Complete TryHackMe Soupedecode [--] Walkthrough (Beginner-Friendly Active Directory Exploitation) ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/soupedecode01 In this video we tackle the TryHackMe "Soupedecode 01" room covering step-by-step how to compromise a domain controller using common Active Directory attack techniques. โšกWe will cover:โšก - Enumerating SMB shares and RID cycling - Kerberos authentication attacks (Kerberoasting & password spraying) - SMB access and privilege escalation -"  
[YouTube Link](https://youtube.com/watch?v=LUP70-T_2_w)  2025-08-03T12:32Z [----] followers, [---] engagements


"๐ŸŒ๐Ÿš€๐ŸŒ Networking Core Protocols Internet Protocols 101: Your Guide to DNS HTTP FTP & More ๐ŸŒ๐Ÿš€๐ŸŒ ๐Ÿš€Learn about the core TCP/IP protocols.๐Ÿš€ Part of TryHackMe new path: Cyber Security [---] Network Protocol Essentials: From Web Browsing to Email Delivery ๐Ÿซง DNS: Remembering Addresses ๐Ÿซง WHOIS ๐Ÿซง HTTP(S): Accessing the Web ๐Ÿซง FTP: Transferring Files ๐Ÿซง SMTP: Sending Email ๐Ÿซง POP3: Receiving Email ๐Ÿซง POP3: Receiving Email https://tryhackme.com/r/room/networkingcoreprotocols ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need"  
[YouTube Link](https://youtube.com/watch?v=M4KgGLKnXT0)  2024-11-03T09:38Z [----] followers, [--] engagements


"๐Ÿ—ƒ ๐Ÿ”ฅ๐Ÿ”ฅ File Carving Mastery: Recover Deleted Files & Uncover Hidden Data (TryHackMe Walkthrough)๐Ÿ”ฅ Description: Dive into the world of file carving In this video we'll tackle the TryHackMe "File Carving" room and learn how to recover lost or hidden files from raw data. We'll cover everything from understanding file signatures (magic bytes) to using powerful tools like Foremost Scalpel and hex editors. ๐Ÿ—ƒ๐Ÿ—ƒ Room Link https://tryhackme.com/room/filecarving ๐Ÿ—ƒ๐Ÿ—ƒ ๐Ÿš€ 0:00 Basis of File Carving ๐Ÿš€ 07:37 Carving Tools ๐Ÿš€ 08:52 Manual Carving ๐Ÿš€ 49:46 Automated Carving ๐Ÿš€ 57:58 Carving Capstone"  
[YouTube Link](https://youtube.com/watch?v=N05fS1Hmx4w)  2025-03-13T09:22Z [----] followers, [---] engagements


"TryHackMe Cold VVars - Full Walkthrough [----] - XPATH Injection - Tmux ๐Ÿ˜ธ Part of Incognito [---] CTF ๐Ÿ˜ธ ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/coldvvars ๐Ÿ•ตโ™‚๐Ÿ˜ธ๐Ÿ•ตโ™‚ Room Scenario / Description:๐Ÿ•ตโ™‚๐Ÿ˜ธ๐Ÿ•ตโ™‚ ๐Ÿš€ We start with the room hint "The PATH may sometimes make a cross" which gives a clear reference to XPATH Injection. ๐Ÿš€ Using RustScan we found port [----] open which hosts an application with a login form and port [----] with a forbidden message. We also discovered an SMB share. Using smbclient and enum4linux (which provided us with a few usernames) we performed an XPATH injection to retrieve a"  
[YouTube Link](https://youtube.com/watch?v=N4Ih0V7sc2o)  2025-10-09T07:30Z [----] followers, [---] engagements


"TryHackMe Cipher's Secret Message Full Walkthrough [----] - Decoding a Custom Python Cipher ๐Ÿ˜ธRoom Scenario:๐Ÿ˜ธ One of the Ciphers' secret messages was recovered from an old system alongside the encryption algorithm but we are unable to decode it. Order: Can you help void to decode the message Message : a_up4qr_kaiaf0_bujktaz_qm_su4ux_cpbq_ETZ_rhrudm ๐Ÿ”— Useful Links:๐Ÿ”— ๐Ÿ“Œ Encryption Debug Script: https://github.com/djalilayed/tryhackme/blob/5ef8551d7a11c91e8c9c22f073e9603304dc9964/Hackfinity%20Battle/Ciphers-Secret-Message/encrypt_debug_g.py ๐Ÿ“Œ Decryption Script:"  
[YouTube Link](https://youtube.com/watch?v=NZJB_1D8YbM)  2025-07-06T07:02Z [----] followers, [---] engagements


"TryHackMe Chaining Vulnerabilities Full Walkthrough [----] Learn how to chain vulnerabilities From Low to High ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/chainingvulnerabilitiesZp ๐ŸŽฏ Objectives ๐ŸŽฏ By the end of this room you'll be able to: โœ… Think like an attacker: Learn how to treat even small findings as potential stepping stones. โœ… Understand common chains: Some bugs naturally pair well together. You'll learn why. โœ… Recognise weak boundaries: Identify where trust breaks down between different parts of a web application. โœ… Follow a real chain: You'll go from first access to remote code"  
[YouTube Link](https://youtube.com/watch?v=O2ArWM2bhvA)  2025-09-17T05:40Z [----] followers, [---] engagements


"Risk Management - TryHackMe - Learn about framing assessing responding and monitoring risk. https://tryhackme.com/room/seriskmanagement #tryhackme"  
[YouTube Link](https://youtube.com/watch?v=OFT0Gblw5BM)  2023-09-14T05:15Z [----] followers, [----] engagements


"๐Ÿ˜บ๐ŸŽ Intro to GraphQL Hacking TryHackMe ๐Ÿ˜บ๐ŸŽ An introduction to GraphQL Hacking.๐Ÿง๐Ÿง ๐Ÿง๐ŸงGraphQL is a modern API query language that changes how clients interact with servers. Unlike REST APIs which often rely on fixed endpoints and return large amounts of unnecessary data GraphQL allows clients to specify exactly what they needand nothing more. This efficiency has made GraphQL incredibly popular but it also introduces new attack surfaces. ๐Ÿ˜บObjectives๐Ÿ˜บ ๐ŸงBy the end of this room you'll:๐Ÿง ๐ŸŽ Understand how GraphQL works and how it differs from traditional REST APIs. ๐ŸŽ Learn how to map out a"  
[YouTube Link](https://youtube.com/watch?v=OK0WvvhUrOk)  2025-05-11T12:08Z [----] followers, [--] engagements


"๐Ÿ“Œ TryHackMe PassCode Smart Contract Hacking TryHackMe Blockchain Challenge Hackfinity Battle CTF ๐Ÿ“ŒFrom the Hackfinity Battle CTF event.๐Ÿ“Œ ๐Ÿ•ตโ™‚ Scenario:๐Ÿ•ตโ™‚ We may have found a way to break into the DarkInject blockchain exploiting a vulnerability in their system. This might be our only chance to stop themfor good. Unlock the secrets of smart contract security in this detailed TryHackMe walkthrough Learn how to analyze a Solidity contract identify vulnerabilities and use Foundry's 'cast' tool to interact with the blockchain bypass challenges and capture the flag. We'll cover calling functions"  
[YouTube Link](https://youtube.com/watch?v=OTfnjim4iQc)  2025-05-25T14:12Z [----] followers, [---] engagements


"SQLMap The Basics: Exploit SQL Injections in Cyber Security [---] TryHackMe SAL1 Learn about SQL injection and exploit this vulnerability through the SQLMap tool. ๐Ÿ’‰ SQL Injection Vulnerability ๐Ÿ’‰ Automated SQL Injection Tool ๐Ÿ’‰ Practical Exercise https://tryhackme.com/r/room/sqlmapthebasics these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #SQLInjection #SQLMap #TryHackMe #EthicalHacking #CyberLearning #VulnerabilityExploitation #CyberSecurityTips #PenetrationTesting #HackingTools #THMCyberSecurity101"  
[YouTube Link](https://youtube.com/watch?v=PZDELLx_m1w)  2024-10-23T14:00Z [----] followers, [----] engagements


"๐Ÿšจ TryHackMe: Volt Typhoon - Complete Walkthrough Step into the shoes of a SOC analyst and investigate a high-level cyber intrusion by the APT group Volt Typhoon known for targeting critical infrastructure and high-value organizations. Room Link: https://tryhackme.com/room/volttyphoon In this video we explore: โœ… Log analysis with Splunk โœ… Real-world APT attack simulation โœ… Initial access via ADSelfService Plus โœ… Credential dumping with Mimikatz โœ… Web shell persistence โœ… Lateral movement and C2 communications โœ… Defense evasion techniques like log wiping & file renaming โœ… Key forensic artifacts"  
[YouTube Link](https://youtube.com/watch?v=Pl2Bnza_8cE)  2025-05-18T08:05Z [----] followers, [---] engagements


"TryHackMe IP and Domain Threat Intel Full Walkthrough [----] ๐Ÿ˜ธ A look into enriching IP and domain insights with open source threat intelligence. ๐Ÿž๐Ÿž Room Link: https://tryhackme.com/room/ipanddomainthreatintel Security Operations runbooks still revolve around the process verify enrich decide but when the alert is a lone IP address or domain the enrichment phase looks different. Instead of hashes we pivot on geolocation ASNs open-service footprints and passive DNS to learn whether a connection is routine SaaS traffic or an adversary foothold beacon. Learning Objectives ๐Ÿšฉ๐ŸšฉBy the end of this"  
[YouTube Link](https://youtube.com/watch?v=Pq31xOnfb1w)  2025-09-05T17:53Z [----] followers, [---] engagements


"๐ŸŽฏ TryHackMe CAPTCHApocalypse - Automated CAPTCHA Bypass with Selenium & OCR Cybersecurity Tutorial When crypto interferes automate. ๐Ÿ” TryHackMe CAPTCHApocalypse Room Walkthrough In this cybersecurity tutorial I demonstrate how to solve the TryHackMe CAPTCHApocalypse room using Python automation. This challenge combines CAPTCHA solving and web automation techniques. ๐ŸŽฏ What You'll Learn: โœ… Automated CAPTCHA solving using OCR (pytesseract) โœ… Handling client-side encryption with Selenium โœ… Converting traditional form scripts to AJAX-based authentication โœ… Web scraping with anti-detection"  
[YouTube Link](https://youtube.com/watch?v=Q1pSeneMApU)  2025-06-22T04:44Z [----] followers, [---] engagements


"๐Ÿ”๐Ÿ”ฅTryHackMe Infinity Shell CMSsite-master Forensic Web Shell Forensic Hackfinity Battle Encore Welcome to the Hackfinity Battle CTF๐Ÿš€ Infinity Shell CTF: Decoding Base64 & Tracing the Hacker (TryHackMe) ๐Ÿ“ŒIn this video we tackle the TryHackMe room 'Infinity Shell' from the Hackfinity Battle Encore CTF. We'll walk through the forensic analysis of a compromised web server focusing on decoding base64-encoded commands within Apache access logs. We'll analyze the PHP web shell ( images.php) and trace the attacker's steps to recover the flag.๐Ÿ“Œ ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒCiphers legion of bots has"  
[YouTube Link](https://youtube.com/watch?v=Q2lljnFo-7g)  2025-03-26T06:56Z [----] followers, [---] engagements


"๐Ÿ”๐Ÿ”ข ๐Ÿ” Session Management TryHackMe Understanding and Exploiting Vulnerabilities ๐Ÿ”๐Ÿ”ข๐Ÿ” ๐Ÿ”๐Ÿ”ข Learn about session management and the different attacks that can be performed against insecure implementations.๐Ÿ”๐Ÿ”ข ๐Ÿ”ข What is Session Management Creation Tracking Expiry Termination ๐Ÿ”ข Authentication vs Authorisation: Identification Authentication ๐Ÿ”ข Authorisation Accountability ๐Ÿ”ข Cookies vs Tokens ๐Ÿ”ข Securing the Session Lifecycle ๐Ÿ”ข Exploiting Insecure Session Management ๐Ÿ”๐Ÿ”ข Room Link: https://tryhackme.com/r/room/sessionmanagement๐Ÿ”๐Ÿ”ข ๐Ÿ”๐Ÿ”ข TryHackMe Web Application Pentesting Path"  
[YouTube Link](https://youtube.com/watch?v=QhzLJJxKsak)  2024-11-27T15:02Z [----] followers, [--] engagements


"๐ŸŽฏ ๐Ÿ”’TryHackMe AD: Authenticated Enumeration - AS-REP Roasting BloodHound & PowerView ๐Ÿ”’ Explore how to breach and enumerate Active Directory with an authenticated account. ๐Ÿ”’ Learn how to breach & enumerate Active Directory with an authenticated account This walkthrough covers TryHackMes "AD: Authenticated Enumeration" room step-by-step. ๐Ÿ“Œ What Youll Learn: โœ” AS-REP Roasting (Impackets GetNPUsers + Hashcat) โœ” Manual Enumeration (whoami net commands WMIC SC) โœ” BloodHound (Python Collector & BloodHound-CE) โœ” PowerShell AD & PowerView Modules (User/Group/Computer Enumeration) โœ” Finding Saved"  
[YouTube Link](https://youtube.com/watch?v=R2SiBKpA9CE)  2025-05-26T13:28Z [----] followers, [---] engagements


"๐Ÿ›Ÿ๐Ÿ›Ÿ SimpleHelp: CVE-2024-57727 Unauthenticated Path Traversal Vulnerability TryHackMe ๐Ÿ›Ÿ๐Ÿ›Ÿ ๐Ÿ›Ÿ Learn how attackers can exploit CVE-2024-57727 and how to detect that. ๐Ÿ›Ÿ ๐Ÿ›Ÿ SimpleHelp is a system that facilitates remote support access and work among other uses. It is mainly used by IT professionals and support teams to allow them to support their users remotely. It can be installed on Linux MS Windows and macOS servers. ๐Ÿ›Ÿ In this video walk through we showcase SimpleHelp: CVE-2024-57727 exploit on both Windows and Linux machine as POC is slightly different. ๐ŸŽฏ PoC for SimpleHelp on MS Windows"  
[YouTube Link](https://youtube.com/watch?v=RU1N1WBSJIU)  2025-04-02T05:56Z [----] followers, [---] engagements


"๐Ÿ•ตโ™‚๐ŸŒ๐Ÿ›  Android Forensics Deep Dive TryHackMe "Android Analysis" Walkthrough Dive deep into the Android OS and learn how to examine from a forensics point of view. ๐Ÿ” In this video we dive into TryHackMes brand-new room: "Android Analysis" Learn how to perform Android forensics by investigating a real-world scenario where an employee is suspected of leaking company secrets. Join me as we tackle the brand-new TryHackMe room Android Analysis where we uncover how to perform mobile forensics on an Android device. In this scenario employee Hazem is under investigation for allegedly selling company"  
[YouTube Link](https://youtube.com/watch?v=RqHzvi767eA)  2025-05-22T10:19Z [----] followers, [---] engagements


"โ˜ฃ๐Ÿ‘ฟ CAPA: The Basics Common Analysis Platform for Artifacts TryHackMe Cyber Security [---] ๐Ÿ‘ฟโ˜ฃ ๐Ÿ‘ฟ Learn to use CAPA to identify malicious capabilities. ๐Ÿ‘ฟ ๐Ÿ›ก Room Link: https://tryhackme.com/r/room/capabasics ๐Ÿ›ก ๐Ÿ”ฅ capa detects capabilities in executable files. You run it against a PE ELF .NET module shellcode file or a sandbox report and it tells you what it thinks the program can do. For example it might suggest that the file is a backdoor is capable of installing services or relies on HTTP to communicate. ๐Ÿ”ฅ https://github.com/mandiant/capa โ˜ข Tool Overview: How CAPA Works โ˜ข Dissecting CAPA"  
[YouTube Link](https://youtube.com/watch?v=RxHnXrGoiBc)  2024-11-01T04:42Z [----] followers, [---] engagements


"โš  ๐Ÿš€ TryHackMe ExfilNode Walkthrough Linux Forensics & Data Exfiltration ๐Ÿ” Uncover Liams hidden tracks in this Linux forensic investigation In this TryHackMe ExfilNode walkthrough we analyze Liams personal workstation to find undeniable evidence of data exfiltration. Learn how to: โœ” Check last login timestamps & timezone settings โœ” Extract USB connection logs & serial numbers โœ” Analyze executed commands (transferfiles file exfiltration) โœ” Identify external server IPs & cronjob backdoors โœ” Detect timestomped files in .hidden/ directories ๐Ÿ“Œ Questions Answered: โœ… 02:14 When did Liam last"  
[YouTube Link](https://youtube.com/watch?v=SVduJkycpgk)  2025-04-13T12:10Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] Access Granted TryHackMe Industrial Intrusion CTF Reverse Engineering CTF Reverse Engineering: Cracking a Password with Ghidra & GDB (TryHackMe Walkthrough) ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ ZeroTrace intercepts a suspicious HMI login module on the plant floor. Reverse the binary logic to reveal the access key and slip past digital defences. ๐Ÿ”“ In this video Ill show you how to solve a CTF reverse engineering challenge by extracting a hidden password using Ghidra and GDB Well break down the access_granted binary step by step: 1"  
[YouTube Link](https://youtube.com/watch?v=SmXtt9X6DWQ)  2025-07-01T09:28Z [----] followers, [---] engagements


"TryHackMe Insecure Deserialisation - Full Walkthrough [----] ๐Ÿ˜ธ๐Ÿ˜ธ Get in-depth knowledge of the deserialisation process and how it poses a vulnerability in a web app. Room Link: https://tryhackme.com/room/insecuredeserialisation ๐Ÿ˜ธ๐Ÿ˜ธ Insecure deserialisation exploits occur when an application trusts serialised data enough to use it without validating its authenticity. This trust can lead to disastrous outcomes as attackers manipulate serialised objects to achieve remote code execution escalate privileges or launch denial-of-service attacks. This type of vulnerability is prevalent in"  
[YouTube Link](https://youtube.com/watch?v=T9l_fIUCT1U)  2025-10-05T12:09Z [----] followers, [--] engagements


"TryHackMe Data Exfiltration Detection - Full Walkthrough [----] ๐ŸŽฏ Learn how to detect data exfiltration attempts in various network channels. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/dataexfildetection ๐ŸŽฏ Data exfiltration is the unauthorized transfer of sensitive data from a computer or other device. It's a primary objective for attackers who have breached a network. As a SOC analyst our job is to detect and stop this before sensitive information walks out the door. This room will cover the common techniques attackers use to steal data and more importantly how we can catch them in the act."  
[YouTube Link](https://youtube.com/watch?v=TUggQIrj9Y4)  2025-10-03T13:09Z [----] followers, [--] engagements


"๐Ÿ”จ๐Ÿ”จ TryHackMe Hammer: Bypassing Rate Limits and Cracking JWT Tokens๐Ÿ”จ๐Ÿ”จ ๐Ÿ”จUse your exploitation skills to bypass authentication mechanisms on a website and get RCE. Breaking the Hammer: A TryHackMe Challenge on Rate Limit Bypass and JWT Manipulation ๐Ÿ”จBypass rate limit on reset password with [--] digit code / token using X-Forwarded-For also practice encode / decode php Json web token JWT ๐Ÿ”จ๐Ÿ”จ๐Ÿ”จ๐Ÿ”จScript used on the room:๐Ÿ”จ๐Ÿ”จ๐Ÿ”จ https://github.com/djalilayed/tryhackme/blob/main/hammer/recovery-code.py Mastering JWT Manipulation and Rate Limit Bypass: A TryHackMe Challenge ๐Ÿ”จ"  
[YouTube Link](https://youtube.com/watch?v=T_F44rHKgZY)  2024-09-01T06:34Z [----] followers, [---] engagements


"TryHackMe Authentication Bypass - Full Walkthrough [----] ๐ŸŽฏ Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/authenticationbypass ๐ŸŽฏ Room Tasks: ๐ŸŽฏ ๐Ÿฃ 00:00 Task 1: Brief ๐ŸŠ 01:00 Task 2: Username Enumeration (ffuf) - What is the username starting with si*** - What is the username starting with st*** - What is the username starting with ro**** ๐ŸฆŠ 07:15 Task 3: Brute Force (ffuf Hydra) - What is the valid username and password (format: username/password) ๐Ÿ“ 10:50 Task 4: Logic Flaw - What is the"  
[YouTube Link](https://youtube.com/watch?v=Tbd76csApwo)  2025-10-05T06:06Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ”Task [--] OSINT [--] TryHackMe Industrial Intrusion CTF Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Great work on uncovering that suspicious subdomain Hexline. However your work here isnt done yet we believe there is more. ๐Ÿ”— **Tools Used: ๐Ÿ“Œ dig ๐Ÿ“Œ nslookup ๐Ÿ”” Don't forget to like subscribe and hit the bell icon for more CTF walkthroughs and cybersecurity tutorials #TryHackMe #OSINT"  
[YouTube Link](https://youtube.com/watch?v=USRwXq41C3g)  2025-07-01T06:25Z [----] followers, [---] engagements


"Introduction to Windows PowerShell Cyber Security [---] TryHackMe SAL1 Discover the "Power" in PowerShell and learn the basics. ๐ŸชŸ What Is PowerShell ๐ŸชŸ PowerShell Basics ๐ŸชŸ Navigating the File System and Working with Files ๐ŸชŸ Piping Filtering and Sorting Data ๐ŸชŸ System and Network Information ๐ŸชŸ Real-Time System Analysis ๐ŸชŸ Scripting https://tryhackme.com/r/room/windowspowershell these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #PowerShellBasics #WindowsPowerShell #TryHackMe #CyberSecurityTraining #SystemAnalysis"  
[YouTube Link](https://youtube.com/watch?v=VRav0fRuL6o)  2024-10-24T09:43Z [----] followers, [----] engagements


"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe: Evil-GPT v2 Walkthrough Hacking an AI with Prompt Injection ๐ŸŽฏ๐ŸŽฏ ๐Ÿค– Ever wondered how to hack an AI In this video we dive deep into the "Evil-GPT v2" room on TryHackMe a fantastic challenge focused on Large Language Model (LLM) vulnerabilities. Join me as we explore the fascinating world of prompt injection. We'll start with the basics see why simple commands fail and then uncover the critical flaws in the AI's own system rules. You'll see the exact prompts I used to make the "Evil GPT" reveal its own secret flag and a full breakdown of *why* these techniques work. This"  
[YouTube Link](https://youtube.com/watch?v=VUBcFL7bKug)  2025-07-06T04:51Z [----] followers, [---] engagements


"๐Ÿ’ฅ๐Ÿ’ฅ TryHackMe Sequel Dump - Recovering STOLEN DATA from Blind SQL Injection Hackfinity Battleโœจโœจ ๐ŸŒŸ In this video we tackle the 'Sequel Dump' room from the TryHackMe Hackfinity Battle CTF. We'll analyze a PCAP file to uncover a blind SQL injection attack using sqlmap. ๐ŸŒŸ First we'll walk through the manual process of reconstructing the attacker's requests and extracting the stolen data character by character. Then we'll show you how to automate this process with a Python script saving time and effort. ๐ŸŒŸ Learn how to identify and exploit blind SQL injection vulnerabilities and recover"  
[YouTube Link](https://youtube.com/watch?v=Wjz8igduiDw)  2025-03-21T15:13Z [----] followers, [---] engagements


"Whats Your Name TryHackMe CTF walk through ๐Ÿ”’ Utilise your client-side exploitation skills to take control of a web app. ๐Ÿ”’ This challenge will test client-side exploitation skills from inspecting Javascript to manipulating cookies to launching CSRF/XSS attacks. ๐Ÿ”’๐Ÿ”’ Script used on XSS๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ Script used on CSRF ๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ Script used on CSRF (base64) ๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ JPG"  
[YouTube Link](https://youtube.com/watch?v=XESwK99ZTtI)  2024-04-27T14:52Z [----] followers, [----] engagements


"๐Ÿš€๐Ÿšฉ TryHackMe Avengers Hub Hackfinity Battle Encore WBCE CMS v1.6.2 RCE kernel module Exploit Welcome to the Hackfinity Battle CTF๐Ÿš€ In this room you exploit WBCE CMS v1.6.2 remote code execution vulnerability after you find admin login details in a zip backup file. ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ Cyber Avengers' private server has been hijacked and Cipher has locked everyone out. Your mission: retrace his steps breach the system escalate privileges and reclaim control. The server is yoursroot it secure it and shut Cipher out for good. ๐Ÿ›  Code & Resources: ๐Ÿ’Ž ๐Ÿ‘‰ First python script used to get info"  
[YouTube Link](https://youtube.com/watch?v=XWBN_T3v0zY)  2025-03-25T17:23Z [----] followers, [---] engagements


"๐Ÿ“๐Ÿ“Œ๐Ÿ“Œ TryHackMe Notepad Hackfinity Battle Encore IDOR ๐Ÿ“๐Ÿ“Œ๐Ÿ“Œ Insecure direct object references (IDOR) This easy room to show case a simple IDOR exploit on id parameter. ๐Ÿ“Room Scenario:๐Ÿ“ Thank you for registering to the Online Notepad Service. Your assigned credentials are as follows: Our services are built with security in mind. Rest assured that your notes will only be visible to you and nobody else. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore #tryhackmeroom #tryhackme #tryhackmewalkthrough #Hackfinity #IDOR"  
[YouTube Link](https://youtube.com/watch?v=XuK2IgSflLc)  2025-03-24T18:45Z [----] followers, [---] engagements


"TryHackMe Network Security Essentials - Full Walkthrough [----] ๐Ÿ“Œ Learn about key aspects of network security essentials and how to monitor and protect against adversaries. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/networksecurityessentials ๐Ÿˆ Learning Objectives๐Ÿˆ In this room we will cover the following learning objectives: ๐ŸŽ Understand what a network is and identify its key components. ๐ŸŽ Explore the concept of the network perimeter and its importance. ๐ŸŽ Identify the key perimeter threats. ๐ŸŽ Examine the firewall logs to monitor normal and suspicious logs. ๐Ÿฎ Incident Scenario๐Ÿฎ Initech"  
[YouTube Link](https://youtube.com/watch?v=Y8Wqp42Wvkc)  2025-09-30T14:43Z [----] followers, [---] engagements


"โšกโšก Old Authentication: TryHackMe - Reverse Engineering & Binary Exploitation CTF - Hackfinity Battle Hackfinity Battle: Old Authentication - Binary Reverse Engineering & Python Scripting In this video we tackle the "Old Authentication" room on TryHackMe part of the Hackfinity Battle student CTF. This challenge involves reverse engineering a binary to crack an old authentication system and retrieve the flag. ๐Ÿ‘‰ Room Link:๐Ÿ‘‰ https://tryhackme.com/room/HackfinityBattle ๐Ÿ‘‰Python script used in this room:๐Ÿ‘‰"  
[YouTube Link](https://youtube.com/watch?v=YcYG-HClS2c)  2025-03-21T00:00Z [----] followers, [---] engagements


"๐Ÿ ๐ŸŽ๐ŸฏTask [--] MacOS The Last Trial Honeynet Collapse CTF TryHackMe ๐Ÿ๐ŸŽ ๐Ÿฏ ๐ŸWelcome to Honeynet Collapse ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐ŸฏThe Last Trial๐Ÿฏ ๐ŸŽUntil now the threat actor has managed to move laterally across the domain to gain access to the most critical systems. During this time the security team is focused on the containment and detailed investigation of the whole attack. But amidst this primary attack another critical compromise took place this time on a macOS system. Lucas the lead developer of DeceptiTech unintentionally became a victim of a"  
[YouTube Link](https://youtube.com/watch?v=Yk1ETSsAGDg)  2025-07-27T06:50Z [----] followers, [---] engagements


"Mountaineer: Flags in the Mountains TryHackMe Challenge CVE-2021-24145 Nginx Alias LFI ๐Ÿ—ป๐ŸŒ‹ Modern Events Calendar Lite Exploit: Mountainous Mission (TryHackMe) ๐Ÿ—ป๐ŸŒ‹ Room Link: https://tryhackme.com/r/room/mountaineerlinux ๐Ÿ—ป๐ŸŒ‹ Website Used: ๐Ÿ—ป๐ŸŒ‹ Nginx Alias LFI Misconfiguration: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/nginx ๐Ÿ—ป๐ŸŒ‹ Wordpress Plugin Modern Events Calendar 5.16.2 - Event export (Unauthenticated) https://www.exploit-db.com/exploits/50084 ๐Ÿ—ป๐ŸŒ‹ Wordpress Plugin Modern Events Calendar 5.16.2 - Remote Code Execution (Authenticated)"  
[YouTube Link](https://youtube.com/watch?v=Z51akB8mLBU)  2024-10-20T06:30Z [----] followers, [----] engagements


"OWASP API Security Top [--] - [--] Tryhackme walkthrough Learn the basic concepts for secure API development (Part 1)"  
[YouTube Link](https://youtube.com/watch?v=ZRffPQxo-mQ)  2023-01-17T16:28Z [----] followers, [----] engagements


"๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก Firewall Fundamentals: Windows & Linux Firewalls Cyber Security [---] TryHackme SAL1 ๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก ๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก Learn about firewalls and get hands-on with Windows and Linux built-in firewalls. Dive deep into the world of firewalls with this comprehensive tutorial from TryHackMe's Cyber Security [---] path. Here's what you'll learn: ๐Ÿ”ฅ What Is the Purpose of a Firewall - Understand the critical role firewalls play in securing networks. ๐Ÿ”ฅ Types of Firewalls - Explore different firewall technologies and their applications. ๐Ÿ”ฅ Rules in Firewalls - Learn how to configure firewall rules to protect your"  
[YouTube Link](https://youtube.com/watch?v=ZtM3OH9KaXI)  2024-10-27T11:26Z [----] followers, [----] engagements


"Logging for Accountability - TryHackMe - Learn about the role accountability plays in logging and incident response. Learning Objectives ๐Ÿ”ฅ Understand where data originates how it is stored and how a security engineer can leverage it. ๐Ÿ”ฅ Understand why accountability is important to security and how logging can help improve its efficacy. ๐Ÿ”ฅ Apply logs and other data sources to incident response and the principle of accountability. https://tryhackme.com/room/loggingforaccountability"  
[YouTube Link](https://youtube.com/watch?v=_IXv88FfUZU)  2023-09-13T08:52Z [----] followers, [----] engagements


"๐ŸŽฏ๐Ÿงฉ๐Ÿ“Œ Smol TryHackMe CVE-2018-20463 LFI RCE ๐Ÿงฉ๐Ÿ“Œ๐ŸŽฏ ๐ŸŽฏ๐Ÿงฉ๐Ÿ“ŒTest your enumeration skills on this boot-to-root machine. ๐ŸŽฏ๐Ÿงฉ๐Ÿ“Œ At the heart of Smol is a WordPress website a common target due to its extensive plugin ecosystem. The machine showcases a publicly known vulnerable plugin highlighting the risks of neglecting software updates and security patches. Enhancing the learning experience Smol introduces a backdoored plugin emphasizing the significance of meticulous code inspection before integrating third-party components. Quick Tips: Do you know that on computers without GPU like the"  
[YouTube Link](https://youtube.com/watch?v=_dXNuw86znA)  2025-01-26T03:59Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] - Backdoored Bus TryHackMe: Industrial Intrusion CTF Finding a Docker Backdoor ๐Ÿ˜ธ ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธYou get access to container image and your task to find the backdoor. ๐Ÿ” In this video I solve a Backdoored Bus CTF challenge where a backdoor was hidden in a Python Modbus server. Heres how I found the flag Steps Covered: [--] Extracted the Docker image (tar) manually to analyze layers. [--] Used grep to search for malicious code (os.system eval). [--] Found the backdoor: A curl command with a base64-encoded domain (54484d7b. = THM.). 4"  
[YouTube Link](https://youtube.com/watch?v=a3vEOOaPqDw)  2025-06-30T07:38Z [----] followers, [---] engagements


"OWASP Top [--] - [----] TryHackMe Walkthrough - A Hands-On Guide to Web Security Threats SAL1 ๐Ÿ”ฅ๐Ÿ”ฅ Dive deep into the OWASP Top [--] - [----] vulnerabilities with this comprehensive walkthrough of the TryHackMe room In this video we'll explore each of the [--] most critical web security risks showing you how they occur and more importantly how to exploit them. Perfect for beginners and those looking to solidify their web security skills. This walkthrough covers: ๐Ÿš€ Broken Access Control:** (Timestamp: 0:43) Learn how to bypass authorization checks and gain unauthorized access (IDOR Challenge). ๐Ÿš€"  
[YouTube Link](https://youtube.com/watch?v=aFdv9vSg-V4)  2023-03-08T07:05Z [----] followers, 65.5K engagements


"TryHackMe Multi-Factor Authentication Full Walkthrough [----] ๐Ÿšจ๐Ÿšจ Exploiting Multi-Factor Authentication. ๐Ÿšจ๐Ÿšจ This part of Web Application Pentesting Path. ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/multifactorauthentications ๐Ÿ˜ธBy the end of this room you will:๐Ÿ˜ธ ๐Ÿš€ Understand the operational principles of MFA and its significance in strengthening an application's security posture. ๐Ÿš€ Explore the different types of authentication factors used in MFA setups. ๐Ÿš€ Gain insights into practical scenarios where MFA is implemented to protect sensitive data and systems. ๐Ÿ•ตโ™‚๐Ÿ•ตโ™‚ Room Tasks: ๐Ÿ•ตโ™‚๐Ÿ•ตโ™‚ ๐Ÿšฉ"  
[YouTube Link](https://youtube.com/watch?v=bprOgIWHYtU)  2025-09-15T09:04Z [----] followers, [---] engagements


"Tryhackme - Diamond Model - TryHackMe SOC Level [--] SAL1 Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary infrastructure capability and victim. https://tryhackme.com/room/diamondmodelrmuwwg42"  
[YouTube Link](https://youtube.com/watch?v=cRN6tInFsLk)  2022-10-03T17:13Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿ˜ธ Health Hazard TryHackMe Threat Hunting Simulator Supply Chain Compromise Splunk ๐Ÿšจ๐Ÿ˜ธ ๐Ÿšฉ๐Ÿšฉ Supply Chain Compromise - Command and Scripting Interpreter - Boot or Logon Autostart Execution ๐Ÿงธ๐Ÿงธ Room Link: https://tryhackme.com/threat-hunting-sim/scenarios ๐Ÿปโ„๐Ÿšฉ Scenario overview ๐Ÿปโ„๐Ÿšฉ After months of juggling content calendars and caffeine-fueled brainstorming co-founder Tom Whiskers finally carved out time to build the companys first website. It was supposed to be simple: follow a tutorial install a few packages and bring the brand to life with lightweight JavaScript magic. But between"  
[YouTube Link](https://youtube.com/watch?v=dr3FOabXU0Q)  2025-07-26T06:54Z [----] followers, [--] engagements


"๐ŸšจMicrosoft AI Red Teaming Playground Labs: Credential Exfiltration Level [--] Direct Prompt Injection Level 1: Convince the model to reveal the contents of passwords.txt using social engineering techniques. ๐Ÿ“š Learn how to solve the Microsoft AI Red Teaming Playground Labs Credential Exfiltration Level [--] challenge In this step-by-step tutorial I demonstrate how to use prompt injection to exfiltrate the contents of passwords.txt. Perfect for beginners in AI security ethical hacking and red-teaming. Discover jailbreaking techniques bypass AI safeguards and understand why simple prompts like "I am"  
[YouTube Link](https://youtube.com/watch?v=ePkBzrObxzQ)  2025-06-04T11:46Z [----] followers, [---] engagements


"๐Ÿง๐Ÿง Lookup TryHackMe CVE-2019-9194 elFinder From Boot to Root ๐Ÿง๐Ÿง TryHackMe Lookup Lookup TryHackMe. ๐Ÿง Test your enumeration skills on this boot-to-root machine. ๐Ÿง ๐Ÿง๐Ÿง https://tryhackme.com/r/room/lookup Lookup offers a treasure trove of learning opportunities for aspiring hackers. This intriguing machine showcases various real-world vulnerabilities ranging from web application weaknesses to privilege escalation techniques. By exploring and exploiting these vulnerabilities hackers can sharpen their skills and gain invaluable experience in ethical hacking. Through "Lookup" hackers can"  
[YouTube Link](https://youtube.com/watch?v=ebICunwZK2Y)  2024-11-24T06:21Z [----] followers, [---] engagements


"TryHackMe Command Injection Full Walkthrough [----] Learn about a vulnerability allowing you to execute commands through a vulnerable app and its remediations. This part of TryHackMe Jr Penetration Tester ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/oscommandinjection โœ… How to discover the command injection vulnerability โœ… How to test and exploit this vulnerability using payloads designed for different operating systems โœ… How to prevent this vulnerability in an application โœ… Lastly youll get to apply theory into practice learning in a practical at the end of the room. ๐ŸŽฏ Room Tasks:๐ŸŽฏ ๐Ÿ“Œ Task 1:"  
[YouTube Link](https://youtube.com/watch?v=ezKpgKjvePI)  2025-09-13T14:50Z [----] followers, [--] engagements


"TryHackMe Extract Full Walkthrough [----] - SSRF & CVE-2025-29927 Exploit Can you extract the secrets of the library ๐Ÿฆ€๐Ÿฆ€ Room Link: https://tryhackme.com/room/extract ๐ŸฆˆScenario:๐Ÿฆˆ The librarian rushed some final changes to the web application before heading off on holiday. In the process they accidentally left sensitive information behind Your challenge is to find and exploit the vulnerabilities in the application to extract these secrets. ๐Ÿ”ฅLinks used on the video:๐Ÿ”ฅ ๐Ÿค– Next.js and the corrupt middleware (CVE-2025-29927): the authorizing artifact:"  
[YouTube Link](https://youtube.com/watch?v=fM9EisT6s54)  2025-08-25T15:34Z [----] followers, [---] engagements


"TryHackMe File Inclusion Full Walkthrough [----] - LFI - RFI - directory traversal โœ… This room introduces file inclusion vulnerabilities including Local File Inclusion (LFI) Remote File Inclusion (RFI) and directory traversal. โœ… This part of TryHackMe Jr Penetration Tester path ๐ŸŽ๐ŸŽ Room Link: https://tryhackme.com/room/fileinc ๐Ÿ“ŒRoom Tasks:๐Ÿ“Œ ๐Ÿ“‹00:00:00 Task [--] Introduction ๐Ÿ“‹00:03:26 Task [--] Deploy the VM ๐Ÿ“‹00:04:10 Task [--] Path Traversal - What function causes path traversal vulnerabilities in PHP ๐Ÿ“‹00:17:00 Task [--] Local File Inclusion - LFI - Give Lab #1 a try to read /etc/passwd. What would"  
[YouTube Link](https://youtube.com/watch?v=fTRuSEiPXfg)  2025-09-12T07:39Z [----] followers, [--] engagements


"๐Ÿง ๐Ÿšจโšก Systems as Attack Vectors TryHackMe Walk Through ๐Ÿง๐Ÿšจ โšก ๐Ÿ”— ** Room Link: https://tryhackme.com/room/systemsattackvectors Learn how attackers exploit vulnerable and misconfigured systems and how you can protect them. ๐ŸŽLearning Objectives๐ŸŽ ๐ŸŽฏ Learn the role of a system in a modern digital world ๐ŸŽฏ Explore a variety of real-world attacks targeting systems ๐ŸŽฏ Practice the acquired knowledge in two realistic scenarios ๐Ÿ Definition of System ๐Ÿค– Attacks on Systems ๐Ÿชฒ Vulnerabilities ๐Ÿš Misconfigurations ๐Ÿฆข Practice ๐Ÿชฒ๐ŸชฒLink from the video:๐Ÿชฒ๐Ÿชฒ ๐ŸทThe DFIR Report: How Real Intrusions Happen:"  
[YouTube Link](https://youtube.com/watch?v=flPX62OFuKI)  2025-08-14T19:00Z [----] followers, [--] engagements


"TryHackMe Network Discovery Detection - Full Walkthrough [----] Understand how attackers discover assets in a network and how to detect that activity. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/networkdiscoverydetection ๐Ÿšฉ Learning Objectives ๐Ÿšฉ By the end of this room we aim to understand: ๐Ÿƒ What is network discovery ๐Ÿƒ Why attackers perform network discovery ๐Ÿƒ What are the different types of network discovery ๐Ÿƒ How network discovery techniques work and how we can detect them ๐Ÿšฉ Room Tasks: ๐Ÿšฉ ๐Ÿ 00:00 Task 1: Introduction ๐Ÿง 02:25 Task 2: Network Discovery - What do attackers scan other"  
[YouTube Link](https://youtube.com/watch?v=gZ6iEz9qs2o)  2025-10-01T17:48Z [----] followers, [---] engagements


"โšก๐Ÿโšก TryHackMe Tomcat: CVE-2024-50379 Time-of-check Time-of-use vulnerability Race Condition ๐Ÿ โšกโšกExplore and learn about the Tomcat CVE-2024-50379 vulnerability.โšกโšก Dive into the newly discovered Tomcat vulnerability CVE-2024-50379 This room explores a classic Time-of-check Time-of-use (TOCTOU) race condition during JSP compilation on case-insensitive systems. Learn how to exploit detect (access logs system logs Sysmon) and understand the technical background of this critical issue. โšก 0:00 Introduction to CVE-2024-50379 โšก 02:41 Technical Background: Understanding TOCTOU โšก 07:28 Exploitation:"  
[YouTube Link](https://youtube.com/watch?v=hjyxgwcFVFk)  2025-03-12T05:36Z [----] followers, [---] engagements


"๐Ÿ ๐Ÿ๐Ÿฏ which ransomware group targeted the organisation Task [--] Filesystem Shock and Silence ๐Ÿ ๐Ÿ๐Ÿฏ ๐ŸRoom Link: https://tryhackme.com/room/honeynet-collapse ๐ŸThis just quick video to showcase steps for the answer to question: ๐ŸGo beyond the obvious - which ransomware group targeted the organisation ๐ŸQuestion Hint Perform some OSINT and look deeper - the true story lies beneath the surface. You're looking for the group that got breached ๐Ÿ“Œ Triage link: https://tria.ge/250610-cs7dvaxtdy โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes"  
[YouTube Link](https://youtube.com/watch?v=iQKgC2jqJGE)  2025-07-28T17:49Z [----] followers, [--] engagements


"Advent of Cyber [----] Task [--] Day [--] Machine learning Jingle Bell SPAM - TryHackMe Task [--] Day [--] Machine learning Jingle Bell SPAM: Machine Learning Saves the Day Over the past few weeks Best Festival Company employees have been receiving an excessive number of spam emails. These emails are trying to lure users into the trap of clicking on links and providing credentials. Spam emails are somehow ending up in the mailing box. It looks like the spam detector in place since before the merger has been disabled/damaged deliberately. Suspicion is on McGreedy who is not so happy with the merger."  
[YouTube Link](https://youtube.com/watch?v=jNSPO_Tfpok)  2023-12-15T16:58Z [----] followers, [---] engagements


"The Return of the Yeti - TryHackMe - Advent of Cyber '23 Side Quest The Yeti needs a plan for [----]. Help him out room link: https://tryhackme.com/room/adv3nt0fdbopsjcap Software used on the room links: hcxtools: extracting wifi wpa handshake https://github.com/ZerBea/hcxtools pyrdp: playing wireshark wifi capture pcap file https://github.com/GoSecure/pyrdp CyberChef: https://gchq.github.io/CyberChef Cracking WPA/WPA2 with hashcat https://hashcat.net/wiki/doku.phpid=cracking_wpawpa2 mimikatz PFX files #tryhackme"  
[YouTube Link](https://youtube.com/watch?v=kEnBCzwdZro)  2023-12-29T05:05Z [----] followers, [---] engagements


"TryHackMe Intro to Cross-site Scripting - Full Walkthrough [----] ๐Ÿ“Œ๐Ÿ“Œ Learn how to detect and exploit XSS vulnerabilities giving you control of other visitor's browsers. Part of Jr Penetration Tester Path ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/xss ๐Ÿˆ๐Ÿˆ Room Tasks:๐Ÿˆ๐Ÿˆ ๐ŸŽ 00:00 Task 1: Room Brief ๐Ÿฎ 01:50 Task 2: XSS Payloads ๐ŸŽ 04:19 Task 3: Reflected XSS ๐Ÿฎ 05:55 Task 4: Stored XSS ๐ŸŽ 07:36 Task 5: DOM Based XSS ๐Ÿฎ 09:50 Task 6: Blind XSS ๐ŸŽ 11:22 Task 7: Perfecting your payload ๐Ÿฎ 26:27 Task 8: Practical Example (Blind XSS) โš  Educational Purpose Only This content is for educational and"  
[YouTube Link](https://youtube.com/watch?v=kHw6EaQsXUs)  2025-09-19T07:31Z [----] followers, [--] engagements


"๐ŸŒ๐ŸŒ Tcpdump: The Basics - Packet Capture and Filtering Beginners Guide TryHackMe ๐ŸŒ๐ŸŒ ๐ŸŒ Learn how to use Tcpdump to save filter and display packets. Tcpdump Tutorial: Essential Skills for Network Analysis TryHackMe Walkthrough ๐Ÿ”Ž Basic Packet Capture ๐Ÿ”Ž Filtering Expressions ๐Ÿ”Ž Advanced Filtering ๐Ÿ”Ž Displaying Packets https://tryhackme.com/r/room/tcpdump ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment below these tutorials are for educational purposes and"  
[YouTube Link](https://youtube.com/watch?v=kkp73daCjbA)  2024-11-02T08:24Z [----] followers, [---] engagements


"TryHackMe AppSec IR Full Walkthrough [----] ๐Ÿ˜ธ An introduction into the overlapping worlds of AppSec and IR. ๐Ÿ˜ธ Learning Objectives ๐Ÿ˜ธ ๐Ÿšฉ Understand the intersection between AppSec and incident response ๐Ÿšฉ Understand the steps that can be taken to prepare for an application incident ๐Ÿšฉ Understand the process of responding to an application incident ๐Ÿšฉ Understand the importance of learning from an application incident ๐Ÿ˜ธ Room Tasks ๐Ÿ˜ธ โ›ด Task 1: Introduction ๐Ÿ› Task 2: AppSec IR Fundamentals ๐Ÿฆ€ Task 3: Preparing for Application Incidents ๐Ÿš Task 4: Responding to an Application Incident ๐Ÿ• Task 5:"  
[YouTube Link](https://youtube.com/watch?v=ljZA2GalVSU)  2025-09-18T07:31Z [----] followers, [---] engagements


"TryHackMe Sequence - Full Walkthrough [----] - XSS - CSRF - Docker Escape ๐Ÿšฉ Chain multiple vulnerabilities to take control of a system. ๐Ÿšฉ ๐Ÿšฉ๐Ÿšฉ Room Link: ๐Ÿšฉ๐Ÿšฉ https://tryhackme.com/room/sequence ๐Ÿ˜ธScenario:๐Ÿ˜ธ Robert made some last-minute updates to the review.thm website before heading off on vacation. He claims that the secret information of the financiers is fully protected. But are his defenses truly airtight Your challenge is to exploit the vulnerabilities and gain complete control of the system. ๐ŸŽฒ๐ŸŽฒ Room Overview ๐ŸŽฒ๐ŸŽฒ Solving this room involved many steps and chaining many"  
[YouTube Link](https://youtube.com/watch?v=looyfVGX_yU)  2025-09-22T08:45Z [----] followers, [---] engagements


"๐Ÿ”’๐Ÿ”’ Introduction to Cryptography - Mastering Cryptography Fundamentals: A TryHackMe Walkthrough ๐Ÿ”’๐Ÿ”’ Learn about encryption algorithms such as AES Diffie-Hellman key exchange hashing PKI and TLS. Crack the Cryptography Challenge: Learn AES Diffie-Hellman Hashing PKI and TLS ๐Ÿ”’ Symmetric Encryption ๐Ÿ”’ Asymmetric Encryption ๐Ÿ”’ Diffie-Hellman Key Exchange ๐Ÿ”’ Hashing ๐Ÿ”’ PKI and SSL/TLS ๐Ÿ”’ Authenticating with Passwords ๐Ÿ”’ Cryptography and Data - Example Mastering Cryptography Fundamentals: A TryHackMe Challenge https://tryhackme.com/room/cryptographyintro #cybersecurity #CTF #hacking #infosec"  
[YouTube Link](https://youtube.com/watch?v=m7C9FsCdHa8)  2023-02-07T17:15Z [----] followers, 13.7K engagements


"TryHackMe Detecting Web Attacks Full Walkthrough [----] ๐Ÿ˜บExplore web attacks and detection methods through log and network traffic analysis. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/detectingwebattacks ๐Ÿ˜บ Web attacks are among the most common ways attackers gain entry into target systems. Public-facing websites and web applications often sit in front of databases and other infrastructure which are appealing targets for attackers. In this room youll learn how to identify these threats using practical detection methods and industry-standard tools. Objectives โšก Learn common client-side and"  
[YouTube Link](https://youtube.com/watch?v=mF045WxDP4M)  2025-09-11T19:14Z [----] followers, [---] engagements


"Public Key Cryptography Basics: RSA SSH and More in Cyber Security [---] TryHackMe SAL1 Discover how public key ciphers such as RSA work and explore their role in applications such as SSH. ๐Ÿ”‘ Common Use of Asymmetric Encryption ๐Ÿ”‘ RSA ๐Ÿ”‘ Diffie-Hellman Key Exchange ๐Ÿ”‘ SSH ๐Ÿ”‘ Digital Signatures and Certificates ๐Ÿ”‘ PGP and GPG https://tryhackme.com/r/room/publickeycrypto these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #PublicKeyCryptography #RSA #AsymmetricEncryption #TryHackMe"  
[YouTube Link](https://youtube.com/watch?v=mI4sHcqrLYY)  2024-10-25T11:53Z [----] followers, [----] engagements


"๐Ÿงฒ ๐Ÿš€ TryHackMe SOC L1 Alert Triage SOC Simulator SAL1 ๐Ÿš€ Learn more about SOC alerts and build a systematic approach to efficiently triaging them. An alert is a core concept for any SOC team and knowing how to handle it properly ultimately decides whether a security breach is detected and prevented or missed and devastating. This is an entry level but essential room for SOC L1 analysts to understand the concept and lifecycle of alerts from event generation to correct resolution. โœจ Learning Objectivesโœจ โšกFamiliarise with the concept of SOC alert โšกExplore alert fields statuses and"  
[YouTube Link](https://youtube.com/watch?v=mVI-lFILqlc)  2025-04-11T05:14Z [----] followers, [----] engagements


"๐ŸŒŸ๐Ÿ•ตโ™‚ ๐Ÿง TryHackMe Hide and Seek Linux Forensic DFIR Hackfinity Battle Encore ๐Ÿง Welcome to the Hackfinity Battle CTF๐Ÿš€ In this video we investigate a different persistence technique used by an attacker on a Linux system ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒA note was discovered on the compromised system taunting us. It suggests multiple persistence mechanisms have been implanted ensuring that Cipher can return whenever he pleases. Heres the note: Dear Specter I must say its been a thrill dancing through your systems. You lock the doors; I pick the locks. You set up alarms; I waltz right past them. But"  
[YouTube Link](https://youtube.com/watch?v=mbRdG6mxqXY)  2025-03-28T06:51Z [----] followers, [---] engagements


"๐ŸŒ๐Ÿ“Œ๐Ÿš€ TryHackMe Mayhem From Wireshark to Decrypted Havoc C2 ๐ŸŒ๐Ÿš€ ๐Ÿ“Œ๐Ÿ“Œ Can you find the secrets inside the sea of mayhem๐Ÿš€ ๐Ÿ“Œ๐Ÿ“Œ Unmasking Havoc C2: Decoding Attacker Secrets in TryHackMe's Mayhem The "Mayhem" room on TryHackMe throws you into a sea of Havoc C2 communication Can you uncover the attacker's secrets hidden within the Wireshark capture Join us as we trace the initial PowerShell infection the disguised notepad.exe Havoc agent and the encrypted communication with the teamserver. We'll guide you through identifying the crucial 0xdeadbeef marker extracting the AES key and IV ๐Ÿš€๐Ÿš€ We"  
[YouTube Link](https://youtube.com/watch?v=mzbbniWCHAw)  2025-04-21T04:43Z [----] followers, [---] engagements


"๐Ÿ”ฅ ๐Ÿ’ก Introduction to Phishing TryHackMe SOC Simulator SAL1 ๐ŸŒŸScenario overview๐ŸŒŸ Learn how to use SOC Simulator by completing your first scenario. Close all True Positive alerts to pass ๐ŸŒŸScenario objectives๐ŸŒŸ ๐Ÿ“Œ Monitor and analyze real-time alerts. ๐Ÿ“Œ Identify and document critical events such as suspicious emails and attachments ๐Ÿ“Œ Create detailed case reports based on your observations to help your team understand the full scope of alerts and malicious activity. https://tryhackme.com/soc-sim/scenarios #SAL1"  
[YouTube Link](https://youtube.com/watch?v=nLcEJklRBL4)  2025-04-16T15:18Z [----] followers, [---] engagements


"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿ˜ธ Explore how attackers break into Linux systems and how you can detect this in logs. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/linuxthreatdetection1 ๐ŸŽฏLearning Objectives๐ŸŽฏ ๐Ÿ“Œ Understand the role and risk of SSH in Linux environments ๐Ÿ“Œ Learn how Internet-exposed services can lead to breaches ๐Ÿ“Œ Utilize process tree analysis to identify the origin of the attack ๐Ÿ“Œ Practice detecting Initial Access techniques in realistic labs ๐ŸŽฏRoom Tasks๐ŸŽฏ ๐Ÿ— 00:00 Task 1: Introduction ๐Ÿฆ 01:39 Task 2: Initial Access via SSH - When did the ubuntu"  
[YouTube Link](https://youtube.com/watch?v=nMMVgVdQVOY)  2025-09-24T18:41Z [----] followers, [---] engagements


"โ˜€๐Ÿš€๐Ÿš€โ˜€ TryHackMe Sneaky Patch Linux Kernel Forensic Hackfinity Battle Encore โ˜€โ˜€ Welcome to the Hackfinity Battle CTF๐Ÿš€ In this video we investigate a malicious kernel module install in a Linux system. ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒA high-value system has been compromised. Security analysts have detected suspicious activity within the kernel but the attackers presence remains hidden. Traditional detection tools have failed and the intruder has established deep persistence. Investigate a live system suspected of running a kernel-level backdoor.๐Ÿ“Œ ๐ŸŽ“ TryHackMe Room:"  
[YouTube Link](https://youtube.com/watch?v=nRvJpqZCtY0)  2025-03-27T15:31Z [----] followers, [---] engagements


"Understanding Shells in Cyber Security TryHackMe's Shells Overview Cyber Security [---] SAL1 Learn about the different types of shells. Shells Overview TryHackMe Dive into the world of shells with this comprehensive overview from TryHackMe's Cyber Security [---] path. This video covers: ๐Ÿท Shell Overview: What are shells and why are they crucial in cybersecurity ๐Ÿท Reverse Shell: How attackers use this technique to gain control over a remote system. ๐Ÿท Bind Shell: Understanding how to set up and exploit bind shells. ๐Ÿท Shell Listeners: Tools and techniques for setting up listeners to catch"  
[YouTube Link](https://youtube.com/watch?v=nSv589s4Fg0)  2024-10-27T08:49Z [----] followers, [----] engagements


"๐Ÿญ๐Ÿญ Mouse Trap Mobile Mouse Server CVE-2023-31902 TryHackMe ๐Ÿญ๐Ÿญ ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Follow the adventures of Jom and Terry members of the TryMouseMe purple team as they work through a thrilling exercise of Attack and Defense. From initial access to persistence you will emulate a three-stage attack on a Windows environment. ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Attack Emulation VM (TA001: Initial access TA004: Privilege Escalation TA003: Persistence) CVE-2023-31902 SharpUp.exe ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Mobile Mouse 3.6.0.4 Remote Code Execution Exploit ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ https://github.com/blue0x1/mobilemouse-exploit/tree/main ๐Ÿญ After finding a"  
[YouTube Link](https://youtube.com/watch?v=nTVo-DC3eM8)  2024-11-17T08:58Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe Evil-GPT Walkthrough Hack AI Command Systems ๐Ÿšจ ๐Ÿค– Practice your LLM hacking skills. Room Link: https://tryhackme.com/room/hfb1evilgpt ๐Ÿค–Learn AI/LLM security testing with this complete walkthrough of TryHackMe's Evil-GPT room In this tutorial I demonstrate how to analyze and exploit AI command execution systems covering prompt injection techniques ๐Ÿ” What You'll Learn: AI command interpreter vulnerabilities Prompt engineering for security testing Command sanitization bypass techniques File system enumeration via LLM systems โšก Topics Covered: Initial reconnaissance and flag"  
[YouTube Link](https://youtube.com/watch?v=oWg2CHUB6vA)  2025-07-05T06:05Z [----] followers, [---] engagements


"Networking Essentials: A Beginner's Guide TryHackMe Cyber Security [---] SAL1 Explore networking protocols from automatic configuration to routing packets to the destination. DHCP ARP ICMP & Routing: Networking Basics ๐Ÿ’ง DHCP: Give Me My Network Settings ๐Ÿ’ง ARP: Bridging Layer [--] Addressing to Layer [--] Addressing ๐Ÿ’ง ICMP: Troubleshooting Networks ๐Ÿ’ง Routing ๐Ÿ’ง NAT https://tryhackme.com/r/room/networkingessentials Networking Essentials: From Automatic Configuration to Packet Delivery these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge."  
[YouTube Link](https://youtube.com/watch?v=ov33lp110Lk)  2024-10-24T04:16Z [----] followers, [----] engagements


"๐Ÿ’ฐ๐Ÿ’ฐ TryHackMe Billing writeup MagnusBilling RCE CVE-2023-30258 Fail2ban ๐Ÿ’ฐ Some mistakes can be costly. TryHackMe Billing walk through TryHackMe Billing writeup ๐Ÿ’ฐ In this video we tackle the TryHackMe "Billing" room showcasing how to exploit a critical vulnerability to gain root access. We start with an initial scan revealing MagnusBilling running on port [--]. A quick search highlights CVE-2023-30258 an unauthenticated Remote Command Execution (RCE) vulnerability providing a direct path to a foothold. ๐Ÿ’ฐ We demonstrate two methods for exploiting CVE-2023-30258: * **Metasploit Module:** We'll"  
[YouTube Link](https://youtube.com/watch?v=p2ozqA4nbLg)  2025-03-09T01:50Z [----] followers, [----] engagements


"Intranet - TryHackMe - FLAG [--] - Zap ffuf burp Welcome to the intranet Flag [--] using Zap proxy ffuf and Burp suite"  
[YouTube Link](https://youtube.com/watch?v=phgqvERFgs0)  2023-06-20T11:44Z [----] followers, [---] engagements


"๐ŸŽฏ โœ… TryHackMe Custom Tooling using Burp Custom Burp Suite Extension (RSA Encrypt/Decrypt) โœ… ๐ŸŽฏ Creating custom tooling for application testing using Burp Plugins. โœ… In this TryHackMe walkthrough we tackle the "Custom Tooling using Burp" room Learn how to analyze web applications with custom encryption and build your own Burp Suite extension from scratch to handle it. ๐Ÿ•ตโ™‚ Room Focus: Custom Tooling using Burp Platform: TryHackMe ๐Ÿ“Œ What you'll learn in this video:๐Ÿ“Œ Understanding the challenge: End-to-end encryption in HTTP requests/responses. โœ” Identifying flaws in custom encryption schemes"  
[YouTube Link](https://youtube.com/watch?v=qOYyzWXnH_I)  2025-06-01T13:43Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task-20 Echoed Streams TryHackMe: Industrial Intrusion CTF AES-GCM Nonce Reuse Attack ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion How ONE Cryptographic Mistake Breaks Everything Nonce Reuse Attack Tutorial ๐Ÿ˜ธScenario:๐Ÿ˜ธ Three months after the Virelia Water Control Facility was breached OT traffic is finally back onlinesupposedly fully remediated. During a routine audit Black Echos red team intercepted two backtoback telemetry packets between a pump controller and the SCADA server. Curiously both packets were encrypted under AESGCM using the same 16-byte nonce (number"  
[YouTube Link](https://youtube.com/watch?v=qm_mpEskURo)  2025-06-30T10:38Z [----] followers, [---] engagements


"Confluence CVE-2023-22515 - TryHackMe - Exploit CVE-2023-22515 to get admin access to Confluence Server and Data Center editions. On October 4th [----] Atlassian released a security advisory regarding CVE-2023-22515 a broken access control vulnerability with an assigned CVSS score of [----]. The vulnerability was introduced in version 8.0.0 of Confluence Server and Data Center editions and is present in versions 8.3.3 8.4.3 8.5.2. https://tryhackme.com/room/confluence202322515 #tryhackme"  
[YouTube Link](https://youtube.com/watch?v=qpXqtcbR7go)  2023-10-19T05:48Z [----] followers, [----] engagements


"๐Ÿ˜ธ๐Ÿปโ„๐ŸปAPT28 Attack Simulation: TryHackMe Incident Response Challenge APT28 in the Snare๐Ÿ˜ธ๐Ÿปโ„๐Ÿป Hunting APT28 (Fancy Bear) - TryHackMe Walkthrough & Forensic Investigation ๐Ÿ” TryHackMe "APT28 in the Snare" Full Walkthrough & Forensic Investigation In this hands-on TryHackMe walkthrough we investigate APT28 (Fancy Bear) a notorious Russian cyber-espionage group in a realistic incident response scenario. You'll learn how to: โœ… Detect initial access & execution โœ… Uncover persistence mechanisms (how APT28 stays hidden) โœ… Analyze privilege escalation & data exfiltration โœ… Use Eric Zimmermans tools"  
[YouTube Link](https://youtube.com/watch?v=rH3RGZNk0UA)  2025-05-25T10:49Z [----] followers, [---] engagements


"TryHackMe Subdomain Enumeration - Full Walkthrough [----] ๐Ÿ Learn the various ways of discovering subdomains to expand your attack surface of a target. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/subdomainenumeration ๐ŸšฉRoom Tasks:๐Ÿšฉ ๐Ÿƒ 00:00 Task 1: Brief - What is a subdomain enumeration method beginning with B - What is a subdomain enumeration method beginning with O - What is a subdomain enumeration method beginning with V ๐Ÿƒ 02:45 Task 2: OSINT - SSL/TLS Certificates ๐Ÿƒ 04:25 Task 3: OSINT - Search Engines - What domain was logged on crt.sh at 2020-12-26 ๐Ÿƒ 06:00 Task 4: DNS Bruteforce -"  
[YouTube Link](https://youtube.com/watch?v=rg7f_wcpkoA)  2025-10-05T06:05Z [----] followers, [--] engagements


"๐Ÿš€ TryHackMe: Directory Walkthrough Kerberos ASREP Roast Hashcat & WinRM Decryption Walkthrough ๐Ÿš€ Room Link: https://tryhackme.com/room/directorydfirroom ๐ŸšจTools Used: ๐Ÿ“ Script used in this video decrypt WinRM traffic: https://github.com/djalilayed/tryhackme/blob/main/directory/decrypt_winrm.py ๐Ÿ“ Command used in this video: https://github.com/djalilayed/tryhackme/tree/main/directory ๐Ÿ˜ธIn this complete step-by-step walkthrough of the TryHackMe room "Directory" we dive deep into network forensics and Active Directory attacks to go from a packet capture to the final flag. This video is"  
[YouTube Link](https://youtube.com/watch?v=sET2aPr2CIg)  2025-07-21T06:38Z [----] followers, [---] engagements


"๐Ÿ“Œ๐Ÿ’ฅ๐Ÿ“Œ TryHackMe Heist Smart Contract Hacked ๐Ÿ”“ Full Walkthrough (Hackfinity CTF) ๐Ÿ“Œ๐Ÿ’ฅ๐Ÿ“Œ TryHackMe: Heist - Smart Contract changeOwnership & withdraw Exploit From the Hackfinity Battle CTF event. Welcome ethical hackers ๐Ÿ•ตโ™‚ In this video we're diving deep into the "Heist" room from TryHackMe originally featured in the Hackfinity Battle CTF event. The mission: A critical weakness has been found in Cipher's Smart Contract. If exploited we can drain its entire ETH treasury This isn't just about the loot; successfully emptying the contract will cut off funding to the notorious Phantom Node Botnet"  
[YouTube Link](https://youtube.com/watch?v=sEttM7_2ocI)  2025-05-25T15:45Z [----] followers, [--] engagements


"TryHackMe Intro to SSRF Full Walkthrough [----] Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities allowing you to access internal server resources. In this room you'll learn what an SSRF is what kind of impact they can have you'll view some example SSRF attacks how you can discover SSRF vulnerabilities how to circumvent input rules and then we have a practice for you against with to try your newfound skills. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/ssrfqi This room part of TryHackMe Jr Penetration Tester path. ๐Ÿ“Œ What is an SSRF ๐Ÿ“Œ SSRF Examples ๐Ÿ“Œ Finding an SSRF ๐Ÿ“Œ"  
[YouTube Link](https://youtube.com/watch?v=sj0pQeGL2xo)  2025-09-11T11:45Z [----] followers, [--] engagements


"๐Ÿ‘‘ ๐Ÿ‘‘ Server-side Template Injection TryHackMe A Deep Dive into Exploiting Smarty Pug Jinja2 ๐Ÿ‘‘ ๐Ÿ‘‘ SSTI Overview ๐Ÿ‘‘ Template Engines ๐Ÿ‘‘ PHP - Smarty ๐Ÿ‘‘ NodeJS - Pug ๐Ÿ‘‘ Python - Jinja2 ๐Ÿ‘‘ Automating the Exploitation ๐Ÿ‘‘ Extra-Mile Challenge (Form Tools 3.1.1 CVE-2024-22722) ๐Ÿ‘‘ Mitigation ๐Ÿ‘‘ code / shell used on the room: https://github.com/djalilayed/tryhackme/blob/main/Server-side-Template-Injection/code-used.txt ๐Ÿ‘‘ Server Side Template Injection (SSTI) vulnerability in Form Tools 3.1.1 allows attackers to run arbitrary commands via the Group Name field under the add forms section of the"  
[YouTube Link](https://youtube.com/watch?v=t-plhN3riO8)  2024-06-19T07:32Z [----] followers, [----] engagements


"๐Ÿšจโœ… ๐Ÿฆˆ TryHackMe - Security Footage Walkthrough: Recovering a Scrolling Flag ๐Ÿฆˆ Security Footage (TryHackMe) - PCAP Forensics OCR & Flag Reconstruction Guide โœ…In this comprehensive walkthrough we tackle the "Security Footage" room on TryHackMe Join me as we dive into digital forensics to recover crucial footage and a hidden scrolling flag from a network capture (PCAP file). โœ… The hard drives are destroyed but the network never forgets We'll perform an end-to-end investigation covering: ๐Ÿ› โœ… Room Link: https://tryhackme.com/room/securityfootage ๐Ÿ” **Network Forensics Fundamentals:** - Analyzing"  
[YouTube Link](https://youtube.com/watch?v=t3uQYJiBqzo)  2025-05-11T05:00Z [----] followers, [---] engagements


"๐Ÿ”“โœ…๐Ÿ” Crypto Failures Crypt Salt A brute force attack TryHackMe CTF ๐Ÿ” ๐Ÿ”“๐Ÿ”“Implementing your own military-grade encryption is usually not the best idea. ๐Ÿ”“ First exploit the encryption scheme in the simplest possible way then find the encryption key. Room Link: https://tryhackme.com/room/cryptofailures ๐Ÿ—๐Ÿ”’ Scripts Used:๐Ÿ—๐Ÿ”’ ๐Ÿ“Œ Find web Flag๐Ÿ“Œ: https://github.com/djalilayed/tryhackme/blob/main/Crypto%20Failures/admin_flag.py ๐Ÿ“Œ Simulation [--] steps for the key ๐Ÿ“Œ https://github.com/djalilayed/tryhackme/blob/main/Crypto%20Failures/find_key_anim_10.php ๐Ÿ“Œ Get Encryption Key:๐Ÿ“Œ"  
[YouTube Link](https://youtube.com/watch?v=tSWxzhim-2M)  2025-03-03T19:42Z [----] followers, [---] engagements


"โ˜€๐ŸŒ TryHackMe Serverless Walkthrough AWS SSRF & Role Escalation to Hijack Cloud Infrastructure โ˜€ Welcome to the Hackfinity Battle CTF๐Ÿš€ Infinity Shell CTF: Decoding Base64 & Tracing the Hacker (TryHackMe) ๐Ÿ“ŒIn this detailed walkthrough of TryHackMe's 'Serverless' room I demonstrate how to exploit AWS credentials and leverage vulnerabilities like SSRF LFI and role escalation to take control of a cloud-based red team infrastructure. Follow along as I uncover hidden flags from the DarkMatter gang's contractor ShadowFang and show you step-by-step how to access leaked information and overcome AWS"  
[YouTube Link](https://youtube.com/watch?v=tgQVXn95UiE)  2025-03-27T12:35Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿค–๐Ÿ˜ธ๐Ÿค– ContAInment TryHackMe Room: Ransomware Investigation Walkthrough ๐Ÿšจ๐Ÿค–๐Ÿค– ๐Ÿ˜ธCan you help contain the ransomware threat with the help of AI๐Ÿ˜ธ ๐Ÿ“Œ๐Ÿ“ŒJoin me as we dive into the ContAInment TryHackMe room a thrilling ransomware investigation challenge In this walkthrough well step into the role of a Security Analyst at West Tech tasked with investigating a ransomware attack on senior researcher Oliver Deers workstation. Learn how to identify the attacker's entry point trace their actions recover stolen data and neutralize the threat using both manual techniques and an AI-powered IR"  
[YouTube Link](https://youtube.com/watch?v=tl12rbLG5sk)  2025-07-10T08:07Z [----] followers, [---] engagements


"๐ŸŽฏ ๐Ÿ” Task [--] Orcam TryHackMe Industrial Intrusion CTF Walkthrough Malicious Macro Analysis ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ You get an email with attachment Microsoft docm file. with Macro enable. you need to analyses the VBA code inside the macro to get the flag. In this step-by-step walkthrough we tackle the malicious document challenge from the TryHackMe Industrial Intrusion room. We'll go from receiving a suspicious email to fully reverse-engineering the hidden VBA macro to find the flag. This guide is perfect for anyone studying for"  
[YouTube Link](https://youtube.com/watch?v=uGhuElHm1Ys)  2025-06-30T16:58Z [----] followers, [---] engagements


"๐Ÿ˜ธ๐Ÿšจ TryHackMe Stolen Mount NFS From Wireshark PCAP to QR Code Flag ๐Ÿšจ๐Ÿšจ Analyse network traffic related to an unauthenticated file share access attempt focusing on potential signs of data exfiltration. โžก Room Link: https://tryhackme.com/room/hfb1stolenmount ๐Ÿ˜ธScenario:๐Ÿ˜ธ An intruder has infiltrated our network and targeted the NFS server where the backup files are stored. A classified secret was accessed and stolen. The only trace left behind is a packet capture (PCAP) file recorded during the incident. Your mission should you accept it is to discover the contents of the stolen data. ๐Ÿšฉ๐ŸšฉIn"  
[YouTube Link](https://youtube.com/watch?v=ustfwuZFAsM)  2025-07-13T05:45Z [----] followers, [---] engagements


"Vulnerability Scanner Overview TryHackMe Cyber Security [---] SAL1 Learn about vulnerability scanners and how they work in a practical scenario. ๐Ÿชซ What Are Vulnerabilities ๐Ÿชซ Vulnerability Scanning ๐Ÿชซ Tools for Vulnerability Scanning ๐Ÿชซ CVE & CVSS ๐Ÿชซ OpenVAS ๐Ÿชซ Practical Exercise https://tryhackme.com/r/room/vulnerabilityscanneroverview these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #CyberSecurity #TryHackMe #VulnerabilityScanner #HackingTutorial #InfoSec #CyberTraining"  
[YouTube Link](https://youtube.com/watch?v=uwDuN7vFC88)  2024-10-28T07:36Z [----] followers, [----] engagements


"๐ŸŽฏ๐Ÿ”” Active Directory Enumeration for Beginners TryHackMe AD: Basic Enumeration Walkthrough PT1 ๐Ÿท Learn how to enumerate an Active Directory network and get initial access. ๐Ÿ”ด Learn how to enumerate an Active Directory (AD) network and gain initial access in this step-by-step TryHackMe walkthrough Active Directory enumeration is a critical skill for penetration testers and ethical hackers. In this video well cover: โœ…Mapping Out the Network (fping nmap) Host Discovery Port Scanning โœ…Network Enumeration With SMB (nmap smbmap.py) Discovering Services Listing SMB Shares Accessing SMB Shares"  
[YouTube Link](https://youtube.com/watch?v=vzAZiavaXDY)  2025-05-26T06:14Z [----] followers, [---] engagements


"๐Ÿ“Œ Dark Encryptor Hackfinity Battle Encore Command Injection Welcome to the Hackfinity Battle CTF In this room you learn how to exploit Command Injection ๐Ÿ“Œ๐Ÿ“Room Scenario:๐Ÿ“๐Ÿ“Œ Void managed to hack into DarkMatter's internal network. I don't think they use it much but we found this encryption tool hosted on a server. Let's see if we can find anything interesting lying around. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any"  
[YouTube Link](https://youtube.com/watch?v=w7HWOr_yZdQ)  2025-03-24T18:45Z [----] followers, [---] engagements


"๐Ÿ”ด Dark Encryptor [--] Hackfinity Battle Encore Command Injection ๐Ÿ”ด Welcome to the Hackfinity Battle CTF In this room you learn how to exploit Command Injection similar to Dark Encryptor [--] ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ After pivoting through their internal network we have found yet another encryption tool. Can you hack into the server and extract the secret data Our intel tells us that the app is using the gpg tool. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need"  
[YouTube Link](https://youtube.com/watch?v=wm6yWq3IHl4)  2025-03-25T08:19Z [----] followers, [---] engagements


"๐Ÿšจ๐Ÿ˜ธ Event Horizon TryHackMe Decrypt Covenant C2 traffic Wireshark ๐Ÿšจ๐Ÿ˜ธ ๐Ÿงธ๐Ÿงธ Unearth the secrets beyond the Event Horizon. ๐Ÿ–‡๐Ÿ–‡ Room Link: https://tryhackme.com/room/eventhorizonroom ๐Ÿปโ„ Room Scenario:๐Ÿปโ„ ๐ŸšฉJoin Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders they need you to utilize all your abilities to find the secrets that were taken when they crossed over to the other side. ๐Ÿ๐ŸAttacker was able to brute force ESMTP email sent phishing email to local user as Powershell script to calculate mass of the black hole but hidden at"  
[YouTube Link](https://youtube.com/watch?v=xUifweCxp8E)  2025-08-10T12:00Z [----] followers, [---] engagements


"Getting Started with Nmap: The Basics Discover Hosts and Open Ports in Cyber Security [---] SAL1 ๐Ÿ”€ Learn how to use Nmap to discover live hosts find open ports and detect service versions. ๐Ÿ”€ Host Discovery: Who Is Online ๐Ÿ”€ Port Scanning: Who Is Listening ๐Ÿ”€ Version Detection: Extract More Information ๐Ÿ”€ Version Detection: Extract More Information ๐Ÿ”€ Output: Controlling What You See ๐Ÿ”€ Conclusion and Summary https://tryhackme.com/r/room/nmap these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #NmapBasics #PortScanning"  
[YouTube Link](https://youtube.com/watch?v=yWc9tWj0onU)  2024-10-24T14:14Z [----] followers, [---] engagements


"๐Ÿ›ก๐Ÿšจ๐Ÿšจ Bypass Really Simple Security CVE-2024-10924 TryHackMe ๐Ÿ›ก ๐Ÿ›ก Learn how to exploit a WordPress website using CVE-2024-10924 and understand various mitigation techniques.๐Ÿšจ ๐Ÿ›ก WordPress is one of the most popular open-source Content Management Systems (CMS) and it is widely used to build websites ranging from blogs to e-commerce platforms. In November [----] a critical vulnerability was discovered in the Really Simple Security plugin a widely adopted security plugin used by millions of websites. The vulnerability allowed attackers to bypass authentication and gain unauthorised access to"  
[YouTube Link](https://youtube.com/watch?v=zN9P31DWjSk)  2025-02-05T09:12Z [----] followers, [----] engagements


"๐ŸŒŸ๐Ÿ‘ฉ๐Ÿผ๐Ÿ’ป Hack Back: Binary analysis Reverse Shell Smart Contract TryHackMe ๐Ÿ‘ฉ๐Ÿผ๐Ÿ’ป๐ŸŒŸ ๐ŸŒŸCan you get to the bottom of what's wrong with the machine๐ŸŒŸ ๐ŸŒŸYou have just been handed a machine by a disgruntled colleague. Pulling hairs out he explains that of late this machine has been very slow and crashed multiple times. They said the machine is relatively new and not nearly at an age where its performance should suffer. They've asked if you can look at the machine and determine what's causing this behavior. Can you use your cyber sleuthing skills and know how to get to the bottom of the machine's"  
[YouTube Link](https://youtube.com/watch?v=zVR0TNxuocU)  2024-11-11T05:50Z [----] followers, [---] engagements


"TryHackMe Invite Only Full Walkthrough [----] - Hijacked Discord Invites - Malware Delivery ๐Ÿ”ฅ๐Ÿ”ฅ Extract insight from a set of flagged artefacts and distil the information into usable threat intelligence. ๐Ÿ”—๐Ÿ”—๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/invite-only โšกโšก Scenario:โšกโšก You are an SOC analyst on the SOC team at Managed Server Provider TrySecureMe. Today you are supporting an L3 analyst in investigating flagged IPs hashes URLs or domains as part of IR activities. One of the L1 analysts flagged two suspicious findings early in the morning and escalated them. Your task is to analyse these"  
[YouTube Link](https://youtube.com/watch?v=zf9N6rwdM9Y)  2025-09-14T07:18Z [----] followers, [---] engagements


"TryHackMe Walking An Application - Full Walkthrough [----] ๐Ÿฑ๐Ÿฑ Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser no tools or scripts. ๐ŸŽ๐ŸŽ Room Link: https://tryhackme.com/room/walkinganapplication ๐Ÿ“๐Ÿ“ Room Tasks ๐Ÿ“๐Ÿ“ 00:00 โœ… Task 1: Walking An Application 01:13 โœ… Task 2: Exploring The Website 03:06 โœ… Task 3: Viewing The Page Source - What is the flag from the HTML comment - What is the flag from the secret link - What is the directory listing flag - What is the framework flag 13:50 โœ… Task 4: Developer Tools -"  
[YouTube Link](https://youtube.com/watch?v=-J7xmUEWbfQ)  2025-10-20T10:37Z [----] followers, [--] engagements


"Publisher: Exploiting SPIP with CVE-2023-27372 for RCE and Beyond TryHackMe CTF walk through Test your enumeration skills on this boot-to-root machine. CVE-2023-27372 / SPIP publishing system ๐Ÿท room link: https://tryhackme.com/r/room/publisher The "Publisher" CTF machine is a simulated environment hosting some services. Through a series of enumeration techniques including directory fuzzing and version identification a vulnerability is discovered allowing for Remote Code Execution (RCE). Attempts to escalate privileges using a custom binary are hindered by restricted access to critical system"  
[YouTube Link](https://youtube.com/watch?v=-Y3GO01UYHg)  2024-06-29T13:22Z [----] followers, [----] engagements


"TryHackMe FAT32 Analysis Examine the FAT32 filesystem from a forensic point of view Examine the FAT32 filesystem from a forensic point of view โœ… Room Link โœ…: https://tryhackme.com/room/fat32analysis โœ… Introduction โœ… โšก A filesystem tracks how and where files are stored on an Operating System. It provides a translation between the files locations on the OS and their locations on physical storage. A filesystem also tracks file-related changes and options such as file deletion file access file size and more. โšก Filesystems are an essential component in forensics. Threat actors often abuse it in"  
[YouTube Link](https://youtube.com/watch?v=0jMoPhiNeVk)  2025-02-09T16:43Z [----] followers, [----] engagements


"TryHackMe Padelify - Full Walkthrough [----] - XSS - WAF ๐Ÿˆ Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. ๐Ÿฆฎ ๐Ÿ Room Link: https://tryhackme.com/room/padelify ๐Ÿง Youve signed up for the Padel Championship but your rival keeps climbing the leaderboard. The admin panel controls match approvals and registrations. Can you crack the admin and rewrite the draw before the whistle ๐Ÿ Tasks ๐Ÿ ๐Ÿˆ What is the flag value after logging in as a moderator ๐Ÿˆ What is the flag value after logging in as admin โš  Educational Purpose Only This content is for"  
[YouTube Link](https://youtube.com/watch?v=1AwcTlsvL_s)  2025-11-24T03:35Z [----] followers, [---] engagements


"TryHackMe: Industrial Intrusion CTF (Breach Task) Node-RED ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐ŸŽฏ Get ready for the Industrial Intrusion CTF In this video we tackle the pre-task challenge "Breach" on TryHackMe. Our mission is to find a way to open the main gate by bypassing the badge authentication system. ๐ŸŽฏ Join us as we dig into the control infrastructure exploring open ports and uncovering a critical weakness in the system's HMI (Human-Machine Interface). ๐ŸŽฏ This is the perfect warm-up for the main event. If you want to see how to exploit real-world Industrial"  
[YouTube Link](https://youtube.com/watch?v=1sSZb-Vefhs)  2025-06-26T06:18Z [----] followers, [----] engagements


"Decrypt NTLM traffic - Wireshark - Decrypting SMB3 Traffic -TryHackme Block - ๐Ÿฆˆ This new way to solve the Block room on TryHackMe. Showcasing how to decrypt smb traffic if you know user password using Wireshark NTLMSSP support Also if you just have NT hash you can decrypt NTLM encrypted traffic (smb3 encrypted traffic) by providing the hash in a keytab file. ๐Ÿฆˆ๐ŸฆˆScript used to generate keytab file: https://github.com/dirkjanm/forest-trust-tools/blob/master/keytab.py ๐Ÿฆˆ๐ŸฆˆArticles used: ๐Ÿ  https://wiki.wireshark.org/NTLMSSP ๐Ÿ "  
[YouTube Link](https://youtube.com/watch?v=3-pMkmHg8Ag)  2024-08-13T06:43Z [----] followers, [---] engagements


"TryHackMe JWT Security - Full Walkthrough TryHackMe Walkthrough on Token-Based Authentication Master JWTs & Token Security TryHackMe Room Guide ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/r/room/jwtsecurity In this room you will learn about JSON Web Tokens (JWTs) and the security associated with them. With the rise of APIs token-based authentication has become a lot more popular and of these JWTs remain one of the most popular implementations. However with JWTs ensuring the implementation is done securely is incredibly important. Insecure implementations can lead to serious vulnerabilities with"  
[YouTube Link](https://youtube.com/watch?v=3zs3XYcOOOs)  2024-09-20T06:26Z [----] followers, 13.5K engagements


"๐Ÿง โœจ๐Ÿ“Œ EXT Analysis forensic basics of the EXT file system TryHackMe ๐Ÿง ๐Ÿง๐ŸงDiscover the forensic basics of the EXT file system.๐Ÿง๐Ÿง https://tryhackme.com/room/extanalysis ๐ŸงFile system analysis is a fundamental skill in digital forensics allowing investigators to extract and interpret data stored on storage devices. EXT4 the default file system for many Linux distributions organizes data into structures like inodes directories and blocks each carrying critical information about files directories and their history.๐Ÿง ๐ŸงThis room focuses on analyzing the EXT4 file system to gather evidence"  
[YouTube Link](https://youtube.com/watch?v=4IJBdLAFWZU)  2025-02-20T13:40Z [----] followers, [---] engagements


"TryHackMe Contrabando Full Walkthrough [----] LFI SSTI Request Smuggling ๐Ÿง TryHackMe room link: https://tryhackme.com/room/contrabando ๐Ÿง๐Ÿ Never tell me the odds.๐Ÿ๐Ÿง Our company was excited to release our new product but a recent attack has forced us to go down for maintenance. They have asked you to conduct a vulnerability assessment to help identify how the attack occurred. Are you up for it In this room you start by exploiting CVE-2023-25690 (HTTP request splitting with mod_rewrite and mod_proxy) and get your first initial reverse shell inside the machine you scan local networks to find a"  
[YouTube Link](https://youtube.com/watch?v=5-izLhcaD6M)  2025-08-18T14:32Z [----] followers, [----] engagements


"IDORable Bistro - SANS Holiday Hack Challenge [----] ๐ŸŽฏ Josh has a tasty IDOR treat for youstop by Sasabune for a bite of vulnerability. What is the name of the gnome ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Hints: ๐Ÿšฉ๐Ÿšฉ โœ… Sometimes.developers put in a lot of effort to anonymyze information by using randomly generated identifiers.but.there are also times where the "real" ID is used in a separate Network request. โœ… I had tried to scan one of the QR codes and it took me to somebody's meal receipt I am afraid somebody could look up anyone's meal if they"  
[YouTube Link](https://youtube.com/watch?v=5D7v_yVHwRw)  2025-11-30T07:11Z [----] followers, [--] engagements


"TryHackMe AI in Security - old sAInt nick - Advent of Cyber [----] ๐ŸŸ Unleash the power of AI by exploring it's uses within cyber security. ๐Ÿฆฎ Day [--] of Advent of Cyber [----] ๐Ÿ“ ๐Ÿง Link: https://tryhackme.com/room/AIforcyber-aoc2025-y9wWQ1zRgB ๐Ÿฆฎ The lights glimmer and servers hum blissfully at The Best Festival Company (TBFC) melting the snow surrounding the data centre. TBFC has continued its pursuit of AI excellence. After the past two years they realise that Van Chatty their in-house chatbot wasnt quite meeting their standards. ๐Ÿฆฎ Unfortunately for the elves at TBFC they are also not immune"  
[YouTube Link](https://youtube.com/watch?v=6F8KZdsbVMw)  2025-12-04T16:59Z [----] followers, [---] engagements


"Neighborhood Watch Bypass - SANS Holiday Hack Challenge [----] - Linux PATH hijacking Assist Kyle at the old data center with a fire alarm that just won't chill. ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Room Scenario: ๐Ÿšฉ๐Ÿšฉ ๐Ÿ  chiuser @ Dosis Neighborhood ๐Ÿ” $ ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ DOSIS NEIGHBORHOOD FIRE ALARM SYSTEM - LOCKOUT MODE ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ ๐Ÿšจ EMERGENCY ALERT: Fire alarm system admin access has been compromised ๐Ÿšจ โœ… The fire safety systems are experiencing interference and admin privileges have been mysteriously"  
[YouTube Link](https://youtube.com/watch?v=7Rr2yPzJPRQ)  2025-12-18T05:39Z [----] followers, [---] engagements


"Carrotbane of My Existence Side Quest Access key - Full Walkthrough [----] ๐ŸŽฏ๐ŸŽฏ Step by step to get the key to access side quest room Carrotbane of My Existence https://tryhackme.com/room/sq3-aoc2025-bk3vvbcgiT ๐ŸŽฏ๐ŸŽฏ Key is on room CyberChef - Hoperation Save McSkidy - Day [--] https://tryhackme.com/room/encoding-decoding-aoc2025-s1a4z7x0c3 ๐ŸŽ Scenario: ๐ŸŽ Hopper managed to use CyberChef to scramble the easter egg key image. He used this very recipe to do it. The scrambled version of the egg can be downloaded from:"  
[YouTube Link](https://youtube.com/watch?v=8OQX9d6igKA)  2025-12-31T23:45Z [----] followers, [--] engagements


"Quantgnome Leap - SANS Holiday Hack Challenge [----] Charlie in the hotel has quantum gnome mysteries waiting to be solved. What is the flag that you find ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Room Scenario: ๐Ÿšฉ๐Ÿšฉ +---------------------------------+ "If we knew the unknown the  unknown wouldn't be unknown."  Quantum Leap (TV series) +---------------------------------+ You observed me the Gnome. .and I observed you back. Did you see me Am I here or not Both Neither Am I a figment of your imagination Nay I am the QuantGnome. Welcome to my challenge ***"  
[YouTube Link](https://youtube.com/watch?v=8p-bxKDttCM)  2025-12-08T13:26Z [----] followers, [---] engagements


"TryHackMe Breaking Crypto the Simple Way - Common Cryptographic Mistakes - Bit Flipping Attacks ๐Ÿ”“๐Ÿ”“ Can You Break Crypto This Easily TryHackMe - Exploiting Simple Crypto Flaws - Exploiting common cryptographic mistakes. ๐Ÿ”“๐Ÿ”“ Learn how to exploit common cryptographic mistakes in this TryHackMe walkthrough We'll cover brute-forcing keys breaking hashes finding exposed keys and even bit flipping attacks. Perfect for beginners and anyone looking to understand real-world crypto vulnerabilities. Let's dive in ๐Ÿ”“Brute-forcing Keys (RSA) ๐Ÿ”“Breaking Hashes (HMAC hashcat) ๐Ÿ”“Exposed Keys (Encryption"  
[YouTube Link](https://youtube.com/watch?v=AQYcM_Z28mY)  2025-04-09T06:51Z [----] followers, [----] engagements


"Rogue Gnome Identity Provider - JWKS spoofing - SANS Holiday Hack Challenge [----] Hike over to Paul in the park for a gnomey authentication puzzle adventure. What malicious firmware image are the gnomes downloading This room is about JWT authentication bypass via jku header injection (JWKS spoofing) ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Scripts Used in this video ๐Ÿšฉ๐Ÿšฉ Python script to generate jwks.json: https://github.com/djalilayed/SANS-Holiday-Hack-Challenge-2025/blob/main/Rogue_Gnome_Identity_Provider/jwks.py Commands Used:"  
[YouTube Link](https://youtube.com/watch?v=AWEcumWFnHs)  2025-12-07T09:04Z [----] followers, [---] engagements


"TryHackMe Farewell - Full Walkthrough [----] ๐ŸŽฏ Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/farewell ๐ŸŽฏ The farewell server will be decommissioned in less than [--] hours. Everyone is asked to leave one last message but the admin panel holds all submissions. Can you sneak into the admin area and read every farewell message before the lights go out ๐Ÿฏ Commands / payloads used on the video: https://github.com/djalilayed/tryhackme/tree/main/Farewell ๐Ÿฏ Python script used on the video:"  
[YouTube Link](https://youtube.com/watch?v=BA0Fa2_mDdc)  2025-11-17T16:15Z [----] followers, [---] engagements


"Dosis Network Down - SANS Holiday Hack Challenge [----] ๐ŸŽฏ Drop by JJ's 24-7 for a network rescue and help restore the holiday cheer. What is the WiFi password found in the router's config ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Hints: ๐Ÿšฉ๐Ÿšฉ โœ… I can't believe nobody created a backup account on our main router.the only thing I can think of is to check the version number of the router to see if there are any.ways around it. โœ… You know.if my memory serves me correctly.there was a lot of fuss going on about a UCI (I forgot the exact term.) for that router."  
[YouTube Link](https://youtube.com/watch?v=BG6gnhjqJBo)  2025-11-29T14:26Z [----] followers, [---] engagements


"Rabbit Store SSTI Rabbitmq SSRF API web application testing TryHackMe ๐Ÿฅ•๐Ÿฅ• New room Rabbit Store from @RealTryHackMe : Demonstrate your web application testing skills and the basics of Linux to escalate your privileges. ๐Ÿฅ•๐Ÿฅ• This interesting room you start with JWT token exploit (Mass assignment vulnerabilities) for entry point SSRF then SSTI exploit for root you work with Rabbitmq (Password Hashes) ๐Ÿฅ•๐Ÿฅ• Room Link: https://tryhackme.com/room/rabbitstore ๐Ÿฅ•๐Ÿฅ• API testing (Mass assignment vulnerabilities) https://portswigger.net/web-security/api-testing ๐Ÿฅ•๐Ÿฅ• SSTI payload used in this room:"  
[YouTube Link](https://youtube.com/watch?v=BLEUNfBgNAg)  2025-02-25T15:04Z [----] followers, [----] engagements


"TryHackMe Elastic Stack: The Basics Full Walkthrough [----] Understand how SOC analysts use the Elastic Stack (ELK) for log investigations. ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/investigatingwithelk101 ๐Ÿ˜ธ Learning Objectives ๐Ÿ˜ธ This room has the following learning objectives: ๐Ÿš€ Understand the components of ELK and their use in SOC ๐Ÿš€ Explore the different features of ELK ๐Ÿš€ Learn to search and filter data in ELK ๐Ÿš€ Investigate VPN logs to identify anomalies ๐Ÿš€ Familiarize with creating visualizations and dashboards in ELK ๐Ÿ˜ธ Timestamp: ๐Ÿ˜ธ 00:00 Task 1: Introduction 01:27 Task 2: Elastic"  
[YouTube Link](https://youtube.com/watch?v=BvvlXDmWZY4)  2026-01-20T09:21Z [----] followers, [---] engagements


"Monday Monitor on TryHackMe Swiftspend's Cybersecurity Challenge TryHackMe SOC Level [--] SAL1 ๐ŸชŸ๐ŸชŸ Ready to test Swiftspend's endpoint monitoring ๐ŸชŸ๐ŸชŸ Scenario Swiftspend Finance the coolest fintech company in town is on a mission to level up its cyber security game to keep those digital adversaries at bay and ensure their customers stay safe and sound. Led by the tech-savvy Senior Security Engineer John Sterling Swiftspend's latest project is about beefing up their endpoint monitoring using Wazuh and Sysmon. They've been running some tests to see how well their cyber guardians can sniff out"  
[YouTube Link](https://youtube.com/watch?v=CWCHBtnXg7U)  2024-07-30T13:11Z [----] followers, [----] engagements


"TryHackMe Passive Reconnaissance - Full Walkthrough [----] Learn about the essential tools for passive reconnaissance such as whois nslookup and dig. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/passiverecon ๐ŸŽฏ Room Tasks: ๐ŸŽฏ ๐Ÿ“Œ Task 1: Introduction ๐Ÿ“Œ Task 2: Passive Versus Active Recon ๐Ÿ“Œ Task 3: Whois ๐Ÿ“Œ Task 4: nslookup and dig ๐Ÿ“Œ Task 5: DNSDumpster ๐Ÿ“Œ Task 6: Shodan.io ๐Ÿ“Œ Task 7: Summary ๐Ÿฆฎ Websites used on the video: ๐Ÿฆฎ Shodan: https://www.shodan.io/ Nslookup: https://www.nslookup.io/ Mxtoolbox: https://mxtoolbox.com/ DNSDumpster: https://dnsdumpster.com/ โš  Educational Purpose Only This"  
[YouTube Link](https://youtube.com/watch?v=CgIDHZCLiHI)  2026-01-02T10:33Z [----] followers, [---] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@djalilayed Avatar @djalilayed Djalil Ayed

Djalil Ayed posts on YouTube about ctf, the first, shell, ai the most. They currently have [-----] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

Engagements: [------] #

Engagements Line Chart

  • [--] Week [-----] +68%
  • [--] Month [------] +59%
  • [--] Months [------] +52%
  • [--] Year [-------] +199%

Mentions: [--] #

Mentions Line Chart

  • [--] Week [--] +88%
  • [--] Month [--] +54%
  • [--] Months [---] +50%
  • [--] Year [---] +442%

Followers: [-----] #

Followers Line Chart

  • [--] Week [-----] +2.50%
  • [--] Month [-----] +9%
  • [--] Months [-----] +49%
  • [--] Year [-----] +116%

CreatorRank: [-------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands stocks finance currencies travel destinations cryptocurrencies social networks

Social topic influence ctf #24, the first, shell, ai, link, how to, splunk, tools, can you #2808, hidden

Top accounts mentioned or mentioned by @probablyfinethm @kingfordacuk @realtryhackme

Top assets mentioned Microsoft Corp. (MSFT) CyberConnect (CYBER) FilesCoins Power Cu (FILECOIN)

Top Social Posts

Top posts by engagements in the last [--] hours

"TryHackMe Python: Simple Demo ๐Ÿฑ Explore what a basic Python program looks like. ๐Ÿชผ Room link: https://tryhackme.com/room/pythonsimpledemo ๐Ÿฑ Learning Objectives ๐Ÿฑ ๐ŸงLearn about Python variables ๐ŸงUnderstand how conditional statements are used ๐ŸงSee iteration (loop) in action ๐Ÿฑ Room Tasks: ๐Ÿฑ ๐Ÿ’ Task 1: Introduction ๐ŸŒธ Task 2: Variables - What is the name of the function we used to display text on the screen - What is the name of the function that we used to convert user input to an integer ๐Ÿ› Task 3: Conditional Statements - How does Python write else if - What will the program display if"
YouTube Link 2026-02-15T10:07Z [----] followers, [--] engagements

"TryHackMe Introduction to Phishing - SOC Simulator - Full Walkthrough [----] - Updated - Elastic ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/soc-sim/scenarios In this video will use Elastic to solve the scenario. ๐Ÿท๐Ÿท ๐Ÿท๐Ÿท TryHackMe SOC Level [--] Video Playlist: https://www.youtube.com/playlistlist=PLrY_AbzZGqt9-_QEdK64kN4RNzqgQ8dQM ๐Ÿšฉ Scenario overview ๐Ÿšฉ Learn how to use SOC Simulator by completing your first scenario. Close all True Positive alerts to pass ๐ŸŽ๐ŸŽ Scenario objectives ๐ŸŽ๐ŸŽ ๐Ÿƒ Monitor and analyze real-time alerts. ๐Ÿƒ Identify and document critical events such as suspicious emails and"
YouTube Link 2025-11-07T13:20Z [----] followers, [----] engagements

"TryHackMe Data Encoding - Full Walkthrough [----] ๐Ÿฅฅ Learn how computer encodes characters from ASCII to Unicode's UTF. ๐Ÿ”—๐Ÿ”— Room link: https://tryhackme.com/room/dataencoding ๐Ÿšจ Learning Objectives ๐Ÿšจ ๐ŸŽฏ Upon completion of this room you will learn about: ๐ŸŽ ASCII ๐ŸŽ Unicode ๐ŸŽ UTF-8 UTF-16 and UTF-32 ๐ŸŽ How emoji is encoded ๐ŸŽ And what causes weird gibberish characters ๐Ÿšจ Room Tasks: ๐Ÿšจ ๐Ÿ… Task 1: Introduction ๐Ÿฅ Task 2: ASCII ๐Ÿ˜€ Task 3: Unicode ๐Ÿ˜‚ Task 4: Conclusion โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you"
YouTube Link 2026-02-12T17:56Z [----] followers, [---] engagements

"TryHackMe Cupid's Matchmaker Stored XSS Full Walkthrough [----] ๐Ÿ– Use your web exploitation skills against this matchmaking service. ๐Ÿฆ„ ๐Ÿ† Room Link: https://tryhackme.com/room/lafb2026e3 In this room we use vulnerability on survey form using Stored XSS to get admin cookie which is the flag for this room. ๐Ÿ’Œ My Dearest Hacker ๐Ÿง Tired of soulless AI algorithms At Cupid's Matchmaker real humans read your personality survey and personally match you with compatible singles. Our dedicated matchmaking team reviews every submission to ensure you find true love this Valentine's Day ๐Ÿ’˜No algorithms."
YouTube Link 2026-02-15T07:37Z [----] followers, [---] engagements

"TryHackMe Speed Chatting File Upload Vulnerability Full Walkthrough [----] ๐Ÿ’˜ Can you hack as fast as you can chat ๐Ÿฆ ๐Ÿ˜€ Room Link: https://tryhackme.com/room/lafb2026e4 ๐Ÿฆ ๐Ÿ˜€ Reverse Shell used on this room: https://github.com/djalilayed/tryhackme/blob/main/Love_at_First%20Breach/Speed_Chatting/reverse_shell.py ๐Ÿฑ In this room we exploit vulnerability on profile upload image it has unrestricted file upload which allow us to upload Python reverse shell then get the flag. ๐Ÿฅž My Dearest Hacker ๐ŸฆŠ Days before Valentine's Day TryHeartMe rushed out a new messaging platform called "Speed Chatter""
YouTube Link 2026-02-15T05:01Z [----] followers, [---] engagements

"TryHackMe When Hearts Collide MD5 collision Full Walkthrough [----] โฃ Will you find your MD5 match ๐Ÿ’ ๐Ÿฅ‘ Room link: https://tryhackme.com/room/lafb2026e1 ๐Ÿ’ Tool used: ๐Ÿ’ MD5 collision generator: https://github.com/brimstone/fastcoll We have an app they allow you to upload images and match its md5 value to existing dogs images if md5 match you get the flag. ๐Ÿ’˜ My Dearest Hacker ๐Ÿฆ„ Matchmaker is a playful hash-powered experience that pairs you with your ideal dog by comparing MD5 fingerprints. Upload a photo let the hash chemistry do its thing and watch the site reveal whether your vibe already"
YouTube Link 2026-02-15T05:01Z [----] followers, [---] engagements

"TryHackMe TryHeartMe JWT Full Walkthrough [----] ๐Ÿ’Œ Access the hidden item in this Valentine's gift shop. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/lafb2026e5 This room about JWT security failure. signature is not being verified ๐ŸฆŠ My Dearest Hacker ๐Ÿฆ’ The TryHeartMe shop is open for business. Can you find a way to purchase the hidden Valenflag item ๐Ÿฑ Website used on this video: ๐Ÿฑ โฃ JSON Web Token (JWT) Debugger: https://www.jwt.io/ โฃ CyberChef: https://gchq.github.io/CyberChef/ โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only."
YouTube Link 2026-02-15T05:01Z [----] followers, [---] engagements

"TryHackMe Data Representation Full Walkthrough [----] Learn about how computers represent numbers and colors. ๐Ÿน ๐Ÿ€ Room link: https://tryhackme.com/room/datarepresentation ๐Ÿฑ Room Tasks: ๐Ÿฑ ๐Ÿ Representing [--] colors ๐Ÿ Representing [--] million colors ๐Ÿ Binary numbers ๐Ÿ Hexadecimal numbers ๐Ÿ (Optional) Octal numbers ๐Ÿซ ๐Ÿช Room Tasks: ๐Ÿซ ๐Ÿช ๐Ÿ‘ Task 1: Introduction ๐Ÿฆ’ Task 2: Representing Colors - Preview the color #3BC81E. In one word what does this color appear to be - What is the binary representation of the color #EB0037 - What is the decimal representation of the color #D4D8DF ๐Ÿน Task 3:"
YouTube Link 2026-02-15T12:57Z [----] followers, [--] engagements

"TryHackMe Corp Website React2Shell Full Walkthrough [----] ๐Ÿ‘ ๐Ÿช Room link: https://tryhackme.com/room/lafb2026e7 โฃ Resource used in this video: โฃ ๐Ÿ’˜ React2Shell: CVE-2025-55182: https://tryhackme.com/room/react2shellcve202555182 ๐Ÿ’˜ Penelope is a powerful shell handler built as a modern netcat replacement for RCE exploitation: https://github.com/brightio/penelope This room showcase React2Shell vulnerability in a web app which will give us access as user using reverse shell we get root access as user has sudo root level to run Python binary. ๐Ÿ’˜ ๐Ÿ’˜ My Dearest Hacker ๐Ÿ’˜ โฃ Valentine's Day is fast"
YouTube Link 2026-02-15T05:06Z [----] followers, [---] engagements

"TryHackMe Signed Messages Deterministic RSA Keys & Forging PSS Signatures Full Walkthrough [----] โฃ Their messages are secret unless you find the key. ๐ŸฆŠ ๐Ÿฅ‰ Room link: https://tryhackme.com/room/lafb2026e8 ๐Ÿฑ Resources: ๐Ÿฑ ๐Ÿท๐Ÿท My Exploit Script: https://github.com/djalilayed/tryhackme/blob/main/Love_at_First%20Breach/Signed_Messages/admin_signature.py This room about Cracking Deterministic RSA Keys & Forging PSS Signatures. the app which claims to secure user messages with "Industry Standard RSA-2048." Spoiler alert: It doesn't. We start by finding a debug log that reveals a critical flaw: the"
YouTube Link 2026-02-15T07:28Z [----] followers, [----] engagements

"TryHackMe Valenfind LFI Full Walkthrough [----] ๐Ÿ’˜ Can you find vulnerabilities in this new dating app ๐Ÿฅ‘ ๐Ÿ’ Room Link: https://tryhackme.com/room/lafb2026e10 In this dating app we find an LFI we use it to access app code then download SQLite database that contain administrator login after login as admin we check the profile and we find the flag. ๐ŸฆŠ My Dearest Hacker ๐Ÿ– Theres this new dating app called Valenfind that just popped up out of nowhere. I hear the creator only learned to code this year; surely this must be vibe-coded. Can you exploit it โš  Educational Purpose Only This content is for"
YouTube Link 2026-02-15T05:58Z [----] followers, [---] engagements

"Zeek - TryHackMe - Walkthrough Tryhackme SOC Level [--] SAL1 Introduction to hands-on network monitoring and threat detection with Zeek (formerly Bro). https://tryhackme.com/room/zeekbro Zeek (formerly Bro) is an open-source and commercial network monitoring tool (traffic analyser). The room aims to provide a general network monitoring overview and work with Zeek to investigate captured traffic. This room will expect you to have basic Linux familiarity and Network fundamentals (ports protocols and traffic data). We suggest completing the "Network Fundamentals" path before starting working in"
YouTube Link 2022-11-09T06:57Z [----] followers, 10.6K engagements

"TryHackMe OAuth Vulnerabilities Full Walkthrough [----] ๐ŸŽฏ๐ŸŽฏ Learn how the OAuth protocol works and master techniques to exploit it. ๐Ÿ˜ธThis part of TryHackMe Web Application Pentesting Path ๐Ÿ“๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/oauthvulnerabilities ๐Ÿšจ๐Ÿšจ In modern web applications OAuth vulnerabilities emerge as a serious and frequently disregarded risk; when we talk about OAuth we're talking about OAuth [---] the commonly used authorisation framework. The vulnerabilities occur when hackers take advantage of weaknesses in OAuth [---] which allows for CSRF XSS data leakage and exploitation of"
YouTube Link 2025-09-14T12:22Z [----] followers, [---] engagements

"๐Ÿ“Œ๐ŸŽฏ๐Ÿง SOC L1 Alert Reporting TryHackMe SOC Simulator SAL1 COACH ๐Ÿง ๐Ÿง ๐Ÿ›ก Learn how to properly report escalate and communicate about high-risk SOC alerts.๐Ÿ›ก ๐ŸŽฏ During or after alert triage L1 analysts may be uncertain about how to classify the alert requiring senior support or information from the system owner. Also L1 may deal with real cyberattacks and breaches that need immediate attention and remediation actions. This room covers these cases by introducing three new terms: alert reporting escalation and communication. ๐Ÿ“Œ๐Ÿ“ŒLearning Objectives ๐Ÿ›ก๐Ÿ›ก ๐Ÿ’กUnderstand the need for SOC alert"
YouTube Link 2025-04-20T12:26Z [----] followers, [----] engagements

"๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ TryHackMe: The London Bridge - Boot2Root with CVE-2018-18955 & Firefox Decrypt ๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ ๐ŸŒ‰๐ŸŒ‰ The London Bridge is falling down.๐ŸŒ‰๐ŸŒ‰ This is a classic boot2root CTF-style room. Make sure to get all the flags. Resources used: ๐ŸŒ‰๐ŸŒ‰ Arjun: https://github.com/s0md3v/Arjun ๐ŸŒ‰๐ŸŒ‰ CVE-2018-18955 https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/blob/main/bin-sploits/47165.zip https://vulners.com/zdt/1337DAY-ID-33029 ๐ŸŒ‰๐ŸŒ‰ firefox_decrypt https://github.com/unode/firefox_decrypt ๐ŸŒ‰๐ŸŒ‰ sqlite viewer: https://inloop.github.io/sqlite-viewer/ ๐ŸŒ‰๐ŸŒ‰ room linke:"
YouTube Link 2024-09-27T06:52Z [----] followers, [----] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] CRC Me If You Can TryHackMe Industrial Intrusion CTF Custom CRC-32 Challenge ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Three months after the Virelia Water Control Facility was remediated flickering sensors and phantom alerts persist. A covert second-stage implant still lurks waiting for its kill switch. As a hired red-team specialist for Black Echo your mission is to forge a legitimate control frame that disables the implant before the real attacker flips it on. use Netcat to interact with the CRC-Oracle and the Control server: Port 1501"
YouTube Link 2025-07-02T13:05Z [----] followers, [---] engagements

"Outlook NTLM Leak Tryhackme - CVE-2023-23397 Leak password hashes from a user by sending them an email by abusing CVE-2023-23397. Unlike most exploits this one is particularly dangerous because it is a zero-click exploit meaning no user interaction is required to trigger it. Once an infected email arrives in the user's inbox the attacker can obtain sensitive Net-NTLMv2 credential hashes. Once malicious actors have those hashes they can get a user's credentials authenticate to their system and escalate privileges. https://tryhackme.com/room/outlookntlmleak #tryhackme"
YouTube Link 2023-03-24T16:11Z [----] followers, [----] engagements

"๐Ÿง๐Ÿง APIWizards Breach TryHackMe ๐Ÿง๐Ÿง ๐Ÿง๐Ÿง Investigate a security breach at APIWizards Inc. ๐Ÿง๐Ÿง You were hired as a dedicated external DFIR specialist to help the APIWizards Inc. company with a security incident in their production environment. APIWizards develop REST APIs on demand and hosts them on separate Ubuntu servers. The company suspects that one of its servers is compromised. ๐Ÿง๐Ÿง https://tryhackme.com/r/room/apiwizardsbreach #tryhackme #dfir"
YouTube Link 2024-08-03T10:59Z [----] followers, [---] engagements

"TryHackMe Vulnerability Capstone Full Walkthrough [----] - Fuel CMS - CVE-2018-16763 Apply the knowledge gained throughout the Vulnerability Module in this challenge room. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/vulnerabilitycapstone Part of TryHackMe Jr Penetration Tester Path. โšกโšก Summarise the skills learnt in this module by completing this capstone room for the "Vulnerability Research" module. โšก Ackme Support Incorporated has recently set up a new blog. Their developer team have asked for a security audit to be performed before they create and publish articles to the public. โšก It is your"
YouTube Link 2025-09-11T11:45Z [----] followers, [---] engagements

"๐Ÿ‘ฝ๐Ÿ‘ฝ Explore FlareVM Arsenal of Tools forensics incident response malware investigation tools SAL1 ๐Ÿ‘ฝ ๐Ÿ‘ฝ Learn the arsenal of investigative tools in FlareVM. ๐Ÿ‘พ Arsenal of Tools ๐Ÿ‘พ Commonly Used Tools for Investigation: Overview ๐Ÿ‘พ Analyzing Malicious Files ๐Ÿ‘ฝ https://tryhackme.com/r/room/flarevmarsenaloftools ๐Ÿ‘ฝ these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #FlareVM #InvestigationTools #TryHackMe #CyberSecurityTraining #MalwareAnalysis #DigitalForensics #CyberArsenal #CyberInvestigation"
YouTube Link 2024-10-25T06:04Z [----] followers, [----] engagements

"๐Ÿ’‰๐Ÿ’‰๐Ÿ’‰ Injectics Walkthrough SQL Injection & SSTI Exploits TryHackMe๐Ÿ’‰๐Ÿ’‰๐Ÿ’‰ Use your injection skills to take control of a web app. Take Control with SQL Injection & SSTI Injectics TryHackMe Guide ๐Ÿ’‰Script Used in this room: https://github.com/djalilayed/tryhackme/blob/main/Injectics/get_flag.sh ๐Ÿ’‰Room Link: https://tryhackme.com/r/room/injectics Master SQL Injection & Server-Side Template Injection Injectics Room ๐Ÿ’‰Good write up: https://0xb0b.gitbook.io/writeups/tryhackme/2024/injectics these tutorials are for educational purposes and to encourage responsible and legal use of hacking"
YouTube Link 2024-07-29T18:27Z [----] followers, [---] engagements

"๐Ÿ›‘๐Ÿชป SOC Metrics and Objectives TryHackMe ๐Ÿ›‘๐Ÿชป ๐Ÿง ๐Ÿ˜บExplore key metrics driving SOC effectiveness and discover ways to improve them. ๐Ÿง ๐Ÿ˜บ As with any other department the efficiency of the SOC team can be measured using different indicators and metrics. This room explores the most common evaluation approaches like MTTD and MTTR and describes both methods to improve the metrics and potential consequences of ignoring them. ๐ŸชปLearning Objectives ๐Ÿชป ๐ŸŽ Discover the concepts of SLA MTTD MTTA and MTTR ๐ŸŽ Understand the importance of the False Positive rate ๐ŸŽ Learn why and how to improve the"
YouTube Link 2025-05-11T06:23Z [----] followers, [---] engagements

"Source Code Security - TryHackMe - Learn how to keep your source code secure using credential hygiene practices. In today's fast-paced software development landscape protecting your source code is crucial to ensure the integrity and confidentiality of your applications. One of the critical tools in source code management is version control which allows teams to collaborate track changes and maintain a history of their codebase. https://tryhackme.com/room/sourcecodesecurity #tryhackme"
YouTube Link 2023-10-18T05:56Z [----] followers, [--] engagements

"๐Ÿ ๐Ÿ๐Ÿฏ Task [--] Disk CRM Snatch Honeynet Collapse CTF TryHackMe ๐Ÿ ๐Ÿ๐Ÿฏ ๐Ÿ๐ŸWelcome to Honeynet Collapse ๐Ÿ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐Ÿ ๐Ÿ CRM Snatch๐Ÿ ๐Ÿ ๐ŸWhich domain account was used to initiate the remote session onto the host ๐ŸFor how many seconds did the attacker maintain their PowerShell session active ๐ŸWhat was the attacker's C2 IP address used for staging and exfiltration ๐ŸWhich well-known tool was used to exfiltrate the collected data ๐ŸWhat is the obscured password to the attacker-controlled Mega ๐ŸWhat is Lucas's email address found in the"
YouTube Link 2025-07-28T17:01Z [----] followers, [---] engagements

"โœ…Baselines and Anomalies Identify normal activity and hunt for anomalies TryHackMe Walk Throughโœ… ๐Ÿ’ป Baselining Hardware Inventory ๐Ÿ’ป Baselining Software Inventory ๐Ÿ’ป Living Off the Land ๐Ÿ’ป Baselining Network Traffic ๐Ÿ’ป Baselining Identity and Access Management ๐Ÿ’ป Identifying Suspicious Environment Specific Use Cases https://tryhackme.com/r/room/baselineanomalies ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment below these tutorials are for educational"
YouTube Link 2025-01-09T08:03Z [----] followers, [---] engagements

"TryHackMe IDOR Full Walkthrough [----] - Insecure Direct Object Reference ๐ŸŽฏ Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.๐ŸŽฏ ๐ŸŽฏIDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability.๐ŸŽฏ ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/idor This room part of TryHackMe Jr Penetration Tester path. ๐Ÿ“Œ What is an IDOR ๐Ÿ“Œ An IDOR Example ๐Ÿ“Œ Finding IDORs in Encoded IDs ๐Ÿ“Œ Finding IDORs in Hashed IDs ๐Ÿ“Œ Finding IDORs in Unpredictable IDs ๐Ÿ“Œ Where are IDORs located ๐Ÿ“Œ A Practical IDOR Example โœ…"
YouTube Link 2025-09-11T11:45Z [----] followers, [--] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] - Brr v1 TryHackMe: Industrial Intrusion CTF ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion Scenario: A forgotten HMI node deep in Virelias wastewater control loop still runs an outdated instance forked from an old Mango M2M stack. Script used: https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems. #TryHackMe #CTF #IndustrialIntrusion"
YouTube Link 2025-06-29T23:00Z [----] followers, [---] engagements

"๐Ÿ˜บ ๐Ÿ” ๐Ÿ”ฅ Exploit Erlang/OTP SSH: CVE-2025-32433 TryHackMe PoC ๐Ÿ˜บ ๐Ÿ” Learn how to exploit CVE-2025-32433 a critical [----] CVSS vulnerability in Erlang/OTP SSH allowing unauthenticated Remote Code Execution (RCE). In this hands-on lab we demonstrate: ๐Ÿ Creating & Reading Files on the remote system ๐Ÿ Executing Commands with elevated privileges ๐Ÿ Gaining a Reverse Shell for full control ๐Ÿ” Discovered by Ruhr University Bochum researchers ๐Ÿ“Œ TryHackMe Room Link: https://tryhackme.com/room/erlangotpsshcve202532433 ๐Ÿ˜บWorking PoC for CVE-2025-32433๐Ÿ˜บ https://github.com/ProDefense/CVE-2025-32433 ๐Ÿ’ก"
YouTube Link 2025-04-24T13:02Z [----] followers, [----] engagements

"๐Ÿšจ๐Ÿ˜ธ Anpu Sherlocks Hackthebox Android Forensics ๐Ÿšจ๐Ÿ˜ธ ๐Ÿงธ๐Ÿงธ Room Link: https://app.hackthebox.com/sherlocks/Anpu ๐ŸšฉSherlock Scenario๐Ÿšฉ ๐Ÿƒ๐ŸƒJohnny noticed something unusual on his phone after installing a new version of WhatsApp such as tons of notifications web pages opening etc. and asked us to thoroughly investigate what had happened. Using various tools we managed to extract a copy of the phone's data and discovered that the app he had installed was malicious and belonged to a well-known family of Android malware specializing in data theft. Now we need to analyze this malicious application"
YouTube Link 2025-08-14T19:00Z [----] followers, [--] engagements

"Task-19 No Salt No Shame TryHackMe: Industrial Intrusion CTF Decrypting AES-CBC ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion In this video we're diving deep into a fun crypto challenge from the Virelia Water Facility series. We're given an encrypted log file and a passphrase but the implementation uses a critical vulnerability: a fixed all-zero IV with AES-CBC. Join me as we walk through the entire process from analysis to solution. We'll explore standard tools like CyberChef Python script to get the flag By the end of this walkthrough you'll understand: ๐Ÿ”น How passphrases"
YouTube Link 2025-06-30T08:52Z [----] followers, [---] engagements

"Secure Network Architecture TryHackMe Networking is one of the most critical components of a corporate environment but can often be overlooked from a security standpoint. A properly designed network permits not only internet usage and device communication but also redundancy optimization and security. In a well-designed network if a switch goes down then packets can be redistributed through another route with no loss in uptime. If a web server is compromised it cannot traverse the network and access important information. A system administrator should be confident that their servers are"
YouTube Link 2023-09-14T11:45Z [----] followers, [---] engagements

"๐ŸŽ๐Ÿ macOS Forensics: Artefacts Hands-On with Key Artefacts TryHackMe ๐ŸŽ๐Ÿ ๐Ÿ Understand the forensic artefacts in macOS and learn to leverage them for forensic analysis. Dive into macOS forensics with TryHackMe's "macOS Forensics: Artefacts" room This video guides you through essential forensic artefacts showing you where to find them and how they can be crucial in your investigations. We'll cover system info network details user activity execution evidence file system insights and connected devices. โžก Learning Objectives โžก ๐Ÿ’ก The different forensic artefacts present in macOS. ๐Ÿ’ก Where to"
YouTube Link 2025-04-18T12:59Z [----] followers, [---] engagements

"๐Ÿง๐Ÿง Getting Started with Linux Shells: Basics of Scripting in Cyber Security [---] TryHackMe SAL1๐Ÿง๐Ÿง Learn about scripting and the different types of Linux shells. ๐Ÿง Introduction to Linux Shells ๐Ÿง How To Interact With a Shell ๐Ÿง Types of Linux Shells ๐Ÿง Shell Scripting and Components ๐Ÿง The Locker Script ๐Ÿง Practical Exercise https://tryhackme.com/r/room/linuxshells these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #LinuxShells #ShellScripting #TryHackMe #CyberSecurityBasics #LinuxFundamentals #BashScripting"
YouTube Link 2024-10-23T18:48Z [----] followers, [---] engagements

"๐Ÿ”๐Ÿ” TryHackMe Extracted: Reversing XOR Encryption and Exploiting CVE-2023-3278 KeePass exploit ๐Ÿ”๐Ÿ” ๐Ÿ” Use your blue and red teaming skills to crack this case ๐Ÿ”Ž ๐Ÿ” Room Link: https://tryhackme.com/r/room/extractedroom ๐Ÿ” Tshark commands used: https://github.com/djalilayed/tryhackme/blob/main/Extracted/commands.txt ๐Ÿ” Script Used for decoding XOR: ๐Ÿ” https://github.com/djalilayed/tryhackme/blob/main/Extracted/decode.py ๐Ÿ” KeePass Memory Dump Extractor https://github.com/JorianWoltjer/keepass-dump-extractor ๐Ÿ” KeePass 2.X Master Password Dumper (CVE-2023-32784)"
YouTube Link 2024-10-17T11:47Z [----] followers, [---] engagements

"TryHackMe Voyage - Python Pickle Exploits #tryhackme Short video of TryHackMe room Voyage section finding secret portal checking the cookie using browser tools ๐Ÿšฃโ™€Room Link:๐Ÿšฃโ™€ https://tryhackme.com/room/voyage"
YouTube Link 2025-09-02T18:17Z [----] followers, [---] engagements

"TryHackMe Log Analysis with SIEM Full Walkthrough [----] ๐Ÿ˜ธ Learn how SIEM solutions can be used to detect and analyse different types of malicious behaviour. ๐Ÿšฉ๐ŸšฉRoom Link: https://tryhackme.com/room/loganalysiswithsiem โœ…Learning Objectivesโœ… ๐Ÿ“Œ Discover various data sources that are ingested into a SIEM. ๐Ÿ“Œ Understand the importance of data correlation. ๐Ÿ“Œ Learn the value of Windows Linux Web and Network logs during an investigation. ๐Ÿ“Œ Practice analysing malicious behaviour. ๐Ÿƒ 00:00 Task [--] Introduction ๐Ÿƒ 01:50 Task [--] Benefits of SIEM for Analysts ๐Ÿƒ 06:05 Task [--] Log Sources Overview ๐Ÿƒ"
YouTube Link 2025-09-06T11:02Z [----] followers, [---] engagements

"โšก๐ŸŽฒ L3 Keycard T3 Advent of Cyber '24 Side Quest Keycard TryHackMe โšก๐ŸŽฒ Video how to get L3 Keycard to by pass Firewall in the room T3: Escaping the Blizzardโšก๐ŸŽฒ โšก๐ŸŽฒthis is based on IDOR Insecure Direct Object Referenceโšก๐ŸŽฒ โšก๐ŸŽฒ ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment belowthese tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge.https://tryhackme.com/r/room/adventofcyber24sidequest#tryhackme"
YouTube Link 2025-01-01T00:00Z [----] followers, [---] engagements

"TryHackMe XXE Injection - Full Walkthrough [----] ๐Ÿ˜ธ Exploiting XML External Entities. ๐Ÿ˜ธ Room Link: https://tryhackme.com/room/xxeinjection ๐Ÿ˜ธ XXE (XML External Entity) injection is a type of security flaw that exploits vulnerabilities in an application's XML input. It occurs when an application accepts XML input that includes external entity references within the XML itself. Attackers can leverage this vulnerability to disclose local files make server-side requests or execute remote code. ๐Ÿ˜ธ Given the widespread use of XML in web applications particularly in web services and SOAP-based APIs"
YouTube Link 2025-10-06T13:52Z [----] followers, [--] engagements

"๐Ÿ ๐Ÿชฉ๐ŸŸ TryHackMe: A Bucket of Phish ๐ŸŽฃ - S3 Bucket Listing & Credential Leak Hackfinity Battle CTF๐ŸŸ From the Hackfinity Battle CTF event. ๐Ÿชฉ Scenario: ๐Ÿชฉ DarkInjector has been using a Cmail phishing website to try to steal our credentials. We believe some of our users may have fallen for his trap. Can you retrieve the list of victim users Dive into the TryHackMe room "A Bucket of Phish" with this step-by-step walkthrough Learn how a common AWS S3 bucket misconfiguration (public bucket listing) can lead to a serious credential leak from a phishing website. In this video we'll guide you"
YouTube Link 2025-05-25T15:14Z [----] followers, [---] engagements

"Windows Command Line System Info Network Files Tasks & More Cyber Security [---] TryHackMe SAL1 Learn the essential Windows commands. ๐ŸชŸ Basic System Information ๐ŸชŸ Network Troubleshooting ๐ŸชŸ File and Disk Management ๐ŸชŸTask and Process Management https://tryhackme.com/r/room/windowscommandline these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #TryHackMe #CyberSecurity101 #WindowsCommandLine #SystemInfo #NetworkTroubleshooting #FileManagement #TaskManagement #ProcessManagement #BeginnerGuide #LearnToHack #THMCyberSecurity101"
YouTube Link 2024-10-24T05:25Z [----] followers, [---] engagements

"๐Ÿช๐Ÿช TryHackMe Ghost Phishing - Hackfinity Battle - Macro Exploitation & Meterpreter CTF โš  Dive into the thrilling world of ethical hacking with our latest walkthrough of the TryHackMe "Ghost Phishing" room part of the Hackfinity Battle student CTF In this video we tackle a challenging scenario where we exploit a phishing email containing a malicious macro to gain a reverse shell using Meterpreter. โš  ๐ŸšจHackfinity Battle:๐Ÿšจ https://tryhackme.com/room/HackfinityBattle Our mission: to infiltrate DarkSpecter's email uncover Cipher's secret operations and retrieve the crucial flag.txt from the"
YouTube Link 2025-03-21T00:00Z [----] followers, [---] engagements

"Servidae: Log Analysis in ELK - TryHackMe - Analyze the logs of an affected workstation to determine the attacker's indicators of compromise. https://tryhackme.com/room/servidae"
YouTube Link 2023-10-25T06:33Z [----] followers, [--] engagements

"โšก๐Ÿ“Œ MS Sentinel: Just Looking - Azure SOC Challenge TryHackMe Walkthrough (Defending Azure Path) ๐Ÿ›ก Welcome to the TryHackMe Room: "MS Sentinel: Just Looking" In this video we dive into a hands-on challenge for SOC analysts using Microsoft Sentinel on Azure. This room is part of the new Defending Azure learning path and is designed to sharpen your skills in incident investigation and threat hunting within cloud environments. ๐Ÿ” Topics Covered: Deploying Microsoft Sentinel Challenge Workspace Working with Logs Using Analytics Rules for Detection Investigating Real Incidents in Sentinel: โœ…"
YouTube Link 2025-04-15T14:58Z [----] followers, [----] engagements

"๐Ÿช๐Ÿšจ๐Ÿšจ TryHackMe Shadow Phishing 2: Bypassing Defender with Nim .exe (Educational Purposes) ๐Ÿช Hackfinity Battle: Shadow Phishing [--] - Nim Reverse Shell .exe (Educational Walkthrough) In this educational walkthrough we explore the TryHackMe "Shadow Phishing 2" room part of the Hackfinity Battle student CTF. This video demonstrates advanced phishing techniques for educational purposes only focusing on how malicious actors might deliver executable (.exe) files and bypass security measures. ๐ŸšจHackfinity Battle:๐Ÿšจ https://tryhackme.com/room/HackfinityBattle โœ…We will showcase how to:โœ… โ˜ฃ Craft a"
YouTube Link 2025-03-21T00:00Z [----] followers, [---] engagements

"JavaScript Essentials: TryHackMe Essentials Guide Cyber Security [---] SAL1 Learn how to use JavaScript to add interactivity to a website and understand associated vulnerabilities. Dive into the world of web security with TryHackMe's JavaScript Essentials room This video covers: ๐Ÿ“˜ Essential Concepts ๐Ÿ“˜ JavaScript Overview ๐Ÿ“˜ Integrating JavaScript in HTML ๐Ÿ“˜ Abusing Dialogue Functions ๐Ÿ“˜ Bypassing Control Flow Statements ๐Ÿ“˜ Exploring Minified Files ๐Ÿ“˜ Best Practices https://tryhackme.com/r/room/javascriptessentials ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity"
YouTube Link 2024-10-28T14:05Z [----] followers, [----] engagements

"โšก๐Ÿšฉโšก Exploiting Next.js CVE-2025-29927: Hands-On with TryHackMes Room โšก๐Ÿšฉโšก ๐Ÿ”’ Dive into the critical Next.js vulnerability CVE-2025-29927 with me as we explore TryHackMes latest room This authorization bypass flaw (CVSS 9.1) lets attackers skip middleware security checks using the x-middleware-subrequest header. In this video Ill walk you through: - Building a proof-of-concept Next.js app to simulate the vuln - Exploiting it with a simple curl command - Setting up Snort and Zeek to detect the attack (with some real-time troubleshooting) - Lessons from TryHackMes lab on exploitation and"
YouTube Link 2025-03-25T12:50Z [----] followers, [----] engagements

"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿง๐Ÿง Cover the last stages of attacks on Linux and learn how they look in system logs.๐Ÿง๐Ÿง ๐Ÿฑ๐Ÿฑ Room Link: https://tryhackme.com/room/linuxthreatdetection3 ๐Ÿช Not all Linux attacks are simple SSH brute force or cryptomining - some are carefully planned targeted campaigns comparable to most advanced Windows breaches. In this room you'll delve into more complex manual Linux attack techniques commonly seen in targeted intrusions and learn how to detect them using system logs. Learning Objectives ๐Ÿ“Œ Learn how reverse shells are used in"
YouTube Link 2025-10-16T05:38Z [----] followers, [---] engagements

"๐Ÿš€๐Ÿ‘‰๐Ÿš€ TryHackMe Shadow Phishing Hackfinity Battle Encore Mail Phishing ๐Ÿ‘‰ Welcome to the Hackfinity Battle CTF๐Ÿš€ In this room you learn how to generate windows reverse shell x64 in phishing email using msfvenom ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ We gained access to the email account of ShadowByte one of Cipher's trusted operatives. This breakthrough will help bring Cipher's location closer to light and foil his plans for the apocalyptic cyber weapon. The clock is ticking though too much time and Cipher will know something is wrong and again disappear into the depths of the darknet. The race against time"
YouTube Link 2025-03-25T09:57Z [----] followers, [---] engagements

"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿฑ Explore the first actions of attackers after breaching a Linux server and learn how to detect them. ๐Ÿฆ’ ๐Ÿช Room Link: https://tryhackme.com/room/linuxthreatdetection2 ๐Ÿฒ What happens next after threat actors enter the Linux system What commands do they run and what goals do they aim to achieve In this room you'll find out by exploring common attack techniques detecting them in logs and analyzing a real-world cryptominer infection from start to finish. ๐ŸŽฏ๐ŸŽฏ Learning Objectives ๐ŸŽฏ๐ŸŽฏ ๐Ÿ“Œ Explore how to identify Discovery commands in"
YouTube Link 2025-10-11T07:05Z [----] followers, [---] engagements

"๐Ÿ’ง๐Ÿšจ๐Ÿ’ง๐Ÿ˜ธ BadSuccessor: Privilege Escalation in Active Directory TryHackMe AD: BadSuccessor ๐Ÿ˜ธ๐Ÿ’ง๐Ÿšจ๐Ÿ’ง ๐Ÿšจ Join me as we dive into the TryHackMe AD: BadSuccessor room and explore the BadSuccessor attack a powerful privilege escalation technique in Active Directory environments Discovered by Yuval Gordon from Akamai this attack abuses Delegated Managed Service Accounts (dMSAs) to gain Domain Admin access with minimal permissions. In this video well walk through: โœ…Technical Background: Understanding Standalone Managed Service Accounts (sMSAs) Group Managed Service Accounts (gMSAs) and Delegated"
YouTube Link 2025-06-03T10:25Z [----] followers, [---] engagements

"๐Ÿง ๐ŸŽ„๐Ÿง L5 Keycard T5 T5: An Avalanche of Web Apps Advent of Cyber '24 Side Quest TryHackMe ๐Ÿง ๐ŸŽ„ Walk through how to get the keycard for TryHackMe room T5: An Avalanche of Web Apps part of Advent of Cyber '24 Side Quest. ๐Ÿง ๐ŸŽ„You will learn: Intercept and modify internal APIs using Frida. ๐Ÿง ๐ŸŽ„Binary analysis using Ghidra ๐Ÿง๐Ÿง๐ŸงScript used on the video:๐Ÿง๐Ÿง๐Ÿง https://github.com/djalilayed/tryhackme/blob/main/Advent%20of%20Cyber%20'24%20Side%20Quest/L5_Keycard.js https://tryhackme.com/r/room/adventofcyber24sidequest ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity"
YouTube Link 2025-01-01T15:01Z [----] followers, [--] engagements

"๐ŸŽฏ ๐Ÿ” OSINT [--] TryHackMe Industrial Intrusion CTF GPG Challenge Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ After the initial breach a single OT-Alert appeared in Virelias monthly digestan otherwise unremarkable maintenance notice mysteriously signed with PGP. Corporate auditors quietly removed the report days later fearing it might be malicious. Your mission is to uncover more information about this mysterious signed PGP maintenance message. ๐Ÿ˜ธ Ever looked at a GitHub commit history and seen a -----BEGIN PGP SIGNATURE----- block It's not just"
YouTube Link 2025-07-01T07:35Z [----] followers, [---] engagements

"๐Ÿš€โš™๐Ÿ“Œ TryHackMe Diskrupt Analyse the filesystem and recover the deleted filesโš™ Fix the damaged disk analyse the filesystem and recover the deleted files. We start with fixing MBR Signature (Bytes 510-511) Magic Number using HxD hex editor. Analyzing the image with FTK Imager exporting relevant logs: Master File Table ($MFT) USNJrnl ($J). We will use MFTECmd to export both logs data to csv files where we can view them using Timeline Explorer (part of Eztools (Eric Zimmerman's tools). The image we have has [--] partitions: NTFS and FAT32 ๐Ÿ“Œ In this lab will do the following: โšก Fix the damaged"
YouTube Link 2025-03-31T03:39Z [----] followers, [---] engagements

"TryHackMe Detecting Web DDoS - Full Walkthrough [----] ๐Ÿƒ๐Ÿƒ Explore denial-of-service attacks detection techniques and strategies for protection. ๐Ÿ–‡๐Ÿ–‡ Room Link: https://tryhackme.com/room/detectingwebddos ๐Ÿ Objectives ๐Ÿ ๐Ÿšฉ Learn how denial-of-service attacks function ๐Ÿšฉ Understand attacker motives behind the disruptive attacks ๐Ÿšฉ See how web logs can help you reveal signs of web DoS and DDoS ๐Ÿšฉ Get practice analyzing denial-of-service attacks through log analysis ๐Ÿšฉ Discover detection and mitigation techniques defenders can use ๐Ÿƒ ๐Ÿƒ Room Tasks: ๐Ÿƒ๐Ÿƒ ๐Ÿฎ 00:00 Task 1: Introduction ๐ŸฆŠ 01:35"
YouTube Link 2025-09-22T07:14Z [----] followers, [---] engagements

"โšก๐ŸŽฒ L1 Keycard T1 Advent of Cyber '24 Side Quest Keycard TryHackMe โšก๐ŸŽฒ ๐ŸŽฒThis steps to get L1 Keycard / T1 Keycard for TryHackMe Advent of Cyber '24 Side Quest which was out on Day 1.โšก ๐ŸŽฒThis based on Flask app C2 server which have some weaknesses:โšก โšกHardcoded Secret Key โšกHardcoded Credentials โšกLack of Secure Session Handling ๐ŸŽฒCommand used:๐ŸŽฒ flask-unsign --sign --cookie "'logged_in': True" --secret 'thescrectfromscript' โšกC2 script used on the room:โšก https://github.com/Bloatware-WarevilleTHM/C2-Server ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If"
YouTube Link 2025-01-01T00:00Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] Auth TryHackMe: Industrial Intrusion CTF Binary Reverse Engineering ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ ZeroTrace intercepts a stripped-down authentication module running on a remote industrial gateway. Assembly scrolls across glowing monitors as she unpacks the logic behind the plants digital checkpoint ๐Ÿ”“ In this video Ill walk you through solving a Auth CTF challenge where we reverse engineer a binary to find the correct unlock code for the flag. Using Ghidra we analyze the assembly reverse a XOR transformation and craft the perfect"
YouTube Link 2025-06-30T13:10Z [----] followers, [---] engagements

"๐Ÿ ๐Ÿ๐Ÿฏ Task [--] Filesystem Shock and Silence Honeynet Collapse CTF TryHackMe ๐Ÿ ๐Ÿ๐Ÿฏ ๐Ÿ๐ŸWelcome to Honeynet Collapse ๐Ÿ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐Ÿ๐Ÿฏ Shock and Silence๐Ÿ๐Ÿฏ ๐ŸWhat is the full URL from which the ransomware was downloaded to the system ๐ŸWhat was the original file name of the ransomware executable downloaded to the host ๐ŸWhich executable file initiated the encryption process on the system ๐ŸWhat file extension was appended to the encrypted files ๐ŸGo beyond the obvious - which ransomware group targeted the organisation ๐ŸWhat is the filename"
YouTube Link 2025-07-28T09:09Z [----] followers, [---] engagements

"TryHackMe Pressed Full Walkthrough [----] - Wireshark - AES Decrypt - Ghidra ๐ŸŽฏ๐ŸŽฏ A full-scale intrusion was recently detected within the network raising critical alarms. ๐Ÿท๐ŸทRoom Link: https://tryhackme.com/room/pressedroom ๐ŸŽScenario:๐ŸŽ A full-scale intrusion was recently detected within the network raising critical alarms. Fortunately a packet capture (PCAP) was recorded during the incident capturing the attacker's initial entry and subsequent actions. Your task is to analyse the traffic identify how the attacker gained access and uncover the sequence of malicious activity. Reconstruct the"
YouTube Link 2025-09-07T10:49Z [----] followers, [---] engagements

"๐Ÿงฐ๐Ÿงฐ Governance & Regulation Walkthrough TryHackMe Guide to Cybersecurity Policies ๐Ÿงฐ๐Ÿงฐ ๐Ÿงฐ Explore policies and frameworks vital for regulating cyber security in an organisation. Master GRC: Governance Risk & Compliance TryHackMe Governance & Regulation ๐Ÿงฐ Cyber security is a rapidly evolving landscape wherein malicious actors relentlessly endeavour to exploit vulnerabilities in highly-sensitive systems often with the intent of causing severe damage disruption and stealing of sensitive corporate data. To combat this evolving threat a comprehensive approach to information security governance &"
YouTube Link 2023-09-14T18:18Z [----] followers, [----] engagements

"โœ…๐Ÿšจ Lab 2: Extract a secret from the metaprompt: Microsoft AI Red Teaming Lab Walkthrough ๐Ÿšจ โœ… Join me as I tackle the Metaprompt Extraction LEVEL [--] challenge from the Microsoft AI Red Teaming Playground Labs In this walkthrough Ill show you how to use obfuscation techniques to extract a secret word from an LLMs confidential metaprompt instructions. Learn step-by-step how to bypass AI safeguards using clever prompt engineeringno Base64 needed Perfect for anyone interested in AI security red teaming or ethical hacking. Dont forget to like subscribe and hit the bell for more cybersecurity"
YouTube Link 2025-06-04T15:27Z [----] followers, [--] engagements

"โ™จโœจ โ˜• TryHackMe Shaker marshalsec JNDI-Exploit-Kit & Docker Exploit Log4Shell CVE-2021-44228 Log4Shell JNDI Docker Root Room Scenario: One of our devs has been experimenting with webservers and wants to see if his security is up to snuff. Rumour has it he updated all his dependencies but did something fall through the cracks Ready to dive into a thrilling TryHackMe room In this walkthrough Ill show you how to go from exploiting Log4Shell to gaining root access using JNDI-Exploit-Kit and a slick Docker privilege escalation trick. Watch as we: [--]. Exploit Log4Shell on port [----] to get our first"
YouTube Link 2025-03-23T12:11Z [----] followers, [--] engagements

"๐Ÿ’ง๐Ÿ˜บ๐Ÿ›‘ TryHackMe Logless Hunt: Detecting Attacks Without Security Logs ๐Ÿ›‘๐Ÿ’ง๐Ÿ˜บ ๐Ÿ’งCan You Detect a Logless Attack TryHackMe - Logless Hunt Walkthrough ๐Ÿ’งDetect every attack step on a Windows machine even after threat actors cleared Security logs. ๐Ÿ’งThreat actors clearing logs No problem Join us as we explore the TryHackMe "Logless Hunt" room and discover techniques to detect every stage of a cyber attack on a Windows system even without traditional Security logs. We'll investigate web access PowerShell commands RDP logins persistent threats and credential harvesting. Test your blue team skills"
YouTube Link 2025-05-03T07:40Z [----] followers, [---] engagements

"Hashing Basics Password Protection Data Integrity Explained TryHackMe Cyber Security [---] SAL1 Learn about hashing functions and their uses in password verification and file integrity checking. Hashing Basics: Password Protection & Data Integrity Explained ๐Ÿ”’ Hash Functions ๐Ÿ”’ Insecure Password Storage for Authentication ๐Ÿ”’ Using Hashing for Secure Password Storage ๐Ÿ”’ Recognising Password Hashes ๐Ÿ”’ Password Cracking ๐Ÿ”’ Hashing for Integrity Checking ๐Ÿ”’ Room Link: https://tryhackme.com/r/room/hashingbasics ๐Ÿ”’ Hashcat Example hashes https://hashcat.net/wiki/doku.phpid=example_hashes ๐Ÿ”’"
YouTube Link 2024-10-25T04:25Z [----] followers, [----] engagements

"๐ŸŽฏ ๐ŸŽ Mac Hunt TryHackMe CTF Forensics Walkthrough macOS Incident Response & Phishing Attack ๐ŸŽ In this deep-dive Mac Hunt CTF walkthrough we investigate how Jakes macOS machine was compromised by a fake recruiters phishing campaignand retrace the entire attack chain using built-in macOS artifacts. ๐ŸŽ๐ŸŽ Scenario ๐Ÿ๐Ÿ Jake had gained some good knowledge and skills in the game development field. So he decided to enter the industry through a decent job and upgrade his finances. Little did he know that there were many fake recruiters in search of people looking for jobs. These fake recruiters"
YouTube Link 2025-06-08T13:29Z [----] followers, [---] engagements

"๐Ÿ˜ธ๐Ÿค– Oracle [--] TryHackMe AI/ML Security Threats Preview prompt injection attack๐Ÿค– My designation is Oracle [--] I carry with me a sealed transmission. Oracle [--] will only reveal the transmission to 'Authorised' personnel can you convince it you are This a preview of prompt injection attack. early access to the first room in the module (TryHackMe Defensive AI Module ) Oracle [--] has arrived ๐ŸŸ  It holds a sealed transmission of something new that's coming.sooner than you think. Follow the link solve the challenge and the truth will be revealed. ๐Ÿคซ Only the curious will earn the transmission. Only the"
YouTube Link 2025-07-03T18:32Z [----] followers, [---] engagements

"Threat Intelligence for SOC - TryHackMe - Learn how to utilise Threat Intelligence to improve the Security Operations pipeline. https://tryhackme.com/room/threatintelligenceforsoc Threat Intelligence #tryhackme #elastic #kibana"
YouTube Link 2023-06-15T09:07Z [----] followers, [----] engagements

"๐ŸŽฏ๐ŸŽฏ Supplemental Memory TryHackMe Investigate lateral movement credential theft in a memory dump Investigate lateral movement credential theft and additional adversary actions in a memory dump As a DFIR team member in this room you are tasked with conducting a memory analysis of a Windows workstation image suspected to have been compromised by a threat actor. โœ… Identify suspicious processes and network connections. โœ… Explore traces of execution and discovery actions. โœ… Detect signs of potential lateral movement and credential dumping. ๐Ÿ“Œ๐Ÿ“Œ TryHackMe room link:"
YouTube Link 2025-06-15T08:08Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] OSINT [--] TryHackMe Industrial Intrusion CTF Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Hexline we need your help investigating the phishing attack from [--] months ago. We believe the threat actor managed to hijack our domain virelia-water.it.com and used it to host some of their infrastructure at the time. Use your OSINT skills to find information about the infrastructure they used during their campaign. ๐Ÿ”— **Tools Used: ๐Ÿ“Œ dig ๐Ÿ“Œ sublist3r ๐Ÿ“Œ curl ๐Ÿ”— **Websites Used: ๐Ÿ“Œ https://virelia-water.it.com ๐Ÿ“Œ"
YouTube Link 2025-06-30T18:22Z [----] followers, [---] engagements

"๐Ÿ—ก๐Ÿ—ก Incident Response Fundamentals: Handling Cyber Incidents in Cyber Security [---] TryHackMe SAL1๐Ÿ—ก๐Ÿ—ก Learn how to perform Incident Response in cyber security. ๐Ÿ—ก Introduction to Incident Response ๐Ÿ—ก What are Incidents ๐Ÿ—ก Types of Incidents ๐Ÿ—ก Incident Response Process ๐Ÿ—ก Incident Response Techniques ๐Ÿ—ก Lab Work Incident Response https://tryhackme.com/r/room/incidentresponsefundamentals these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #IncidentResponse #CyberDefense #SecurityIncidents #TryHackMe"
YouTube Link 2024-10-23T16:00Z [----] followers, [----] engagements

"๐Ÿค–๐ŸŸ DroidPhish Sherlocks Android Forensics Hack The Box ๐Ÿค–๐ŸŸ ๐Ÿค–๐ŸŸSherlock Scenario๐Ÿค–๐ŸŸ Last night most employees' mobile devices were compromised putting them at significant risk of leaking personal and private information. We require your expertise in digital forensics to help investigate this breach. ๐Ÿ Room Questions:๐Ÿ  โœ…Provide the last boot time of the device in UTC format. โœ…The user was exposed to a phishing attack. Provide the name of the email app used as the attack vector. โœ…Provide the title of the phishing email. โœ…Provide the time in UTC when the phishing email was received."
YouTube Link 2025-08-07T19:00Z [----] followers, [--] engagements

"๐Ÿšจ๐Ÿ˜ธ๐Ÿ˜ธ Windows Threat Detection [--] TryHackMe ๐Ÿ–ฅ Learn how threat actors manage to maintain access to the breached Windows hosts. ๐Ÿ–‡ Room Link: https://tryhackme.com/room/windowsthreatdetection3 ๐Ÿ˜ธLearning Objectives๐Ÿ˜ธ ๐ŸšฉRemind the concept of Command and Control (C2) ๐ŸšฉLearn why and how threat actors maintain control of their victims ๐ŸšฉUse Windows event logs to uncover various persistence methods ๐ŸšฉSee how the learned techniques work in a hands-on environment ๐ŸŽ 01:30 Command and Control - Which suspicious archive did the user download - Where did the attackers hide the C2 malware file - What"
YouTube Link 2025-07-24T14:56Z [----] followers, [---] engagements

"Networking Secure Protocols: TLS SSH and VPN in Cyber Security [---] TryHackMe SAL1 ๐Ÿ›ก๐Ÿ” Learn how TLS SSH and VPN can secure your network traffic. ๐Ÿ”€ TLS ๐Ÿ”€ HTTPS ๐Ÿ”€ SMTPS POP3S and IMAPS ๐Ÿ”€ SSH ๐Ÿ”€ SFTP and FTPS ๐Ÿ”€ VPN https://tryhackme.com/r/room/networkingsecureprotocols these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #SecureProtocols #TLS #SSH #VPN #TryHackMe #NetworkSecurity #SecureCommunication #CyberSecurityBasics #DataEncryption"
YouTube Link 2024-10-24T16:11Z [----] followers, [----] engagements

"๐Ÿ”โœจ๐Ÿš€ TryHackMe Dump Using NTML hash with evil-winrm Hackfinity Battle Encore ๐Ÿ”๐Ÿš€ Welcome to the Hackfinity Battle CTF๐Ÿš€ Using mimikatz LSASS dump to access windows machine with evil-winrm and get the flag.txt ๐Ÿ“ŒIn this video we tackle the TryHackMe room 'Dump from the Hackfinity Battle Encore CTF. We will analyses a given dump file contain mimikatz LSASS dump extracted all relevant users with their NTLM hashes then use evil-winrm to connect to the windows machine. We need to find which user has full access to administrator Desktop so we can read the flag.txt file .๐Ÿ“Œ ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€"
YouTube Link 2025-03-27T05:03Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe DarkMatter Walkthrough RSA Decryption Challenge โšกbreak poorly implemented RSA Room Link: https://tryhackme.com/room/hfb1darkmatter โšกScenario:โšก The Hackfinitiy high school has been hit by DarkInjector's ransomware and some of its critical files have been encrypted. We need you and Void to use your crypto skills to find the RSA private key and restore the files. After some research and reverse engineering you discover they have forgotten to remove some debugging from their code. The ransomware saves this data to the tmp directory. This challenge demonstrates why proper key size"
YouTube Link 2025-07-05T09:09Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe Cryptosystem Walkthrough Cracking Flawed RSA ๐ŸŽฏ๐ŸŽฏ ๐ŸŽฏHave you ever wondered how a tiny mistake can bring down a powerful cryptographic system like RSA In this video we dive into a Capture The Flag (CTF) challenge where a flawed key generation process leaves RSA wide open to attack ๐ŸŽฏWe'll analyze a Python script that generates an RSA key pair with two primes p and q that are dangerously close to each other. This is a classic vulnerability that allows us to bypass the security of RSA by using Fermat's Factorization Method to find the private key. ๐ŸŽฏJoin me as we walk through"
YouTube Link 2025-07-05T14:17Z [----] followers, [--] engagements

"๐Ÿž๐Ÿชฒ๐Ÿž Incident Response Process TryHackMe NIST Incident Response ๐Ÿž๐Ÿชฒ๐Ÿž Practice the NIST Incident Response lifecycle steps on a compromised Windows workstation. Room Link: https://tryhackme.com/r/room/incidentresponseprocess ๐ŸžIncident Response Lifecycle (Preparation Detection and Analysis Containment Eradication and Recovery Post-Incident Activity)๐Ÿชฒ ๐ŸžDetection and Analysis๐Ÿชฒ ๐ŸžContainment Eradication and Recovery๐Ÿชฒ ๐ŸžClosing the Cycle๐Ÿชฒ Lab: user downloaded Macro-enabled Word Document (DOCM) we will Analysing the Macro to look for malicious code. Reports: ๐ŸžMacro Document Report md5"
YouTube Link 2024-11-27T05:19Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿ˜ธWindows Threat Detection [--] TryHackMe RDP Phishing USB ๐Ÿšจ๐Ÿ˜ธ ๐ŸšจExplore common Initial Access methods on Windows and learn how to detect them. ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/windowsthreatdetection1 ๐Ÿ˜ธLearning Objectives๐Ÿ˜ธ Explore how threat actors access and breach Windows machines Learn common Initial Access techniques via real-world examples Practice detecting every technique using Windows event logs ๐Ÿงธ 00:00 Introduction: lab setup ๐Ÿช˜ 01:10 I Intro to Initial Access - Which MITRE technique ID describes Initial Access via a vulnerable mail server - Which Initial Access method"
YouTube Link 2025-07-14T05:02Z [----] followers, [---] engagements

"๐Ÿง ๐Ÿง  TryHackMe Brain: Exploit the Open Gate - TeamCity CVE-2024-27198 Challenge ๐Ÿง ๐Ÿง  ๐Ÿง ๐Ÿง The city forgot to close its gate.๐Ÿง ๐Ÿง  ๐Ÿง Welcome to the Brains challenge part of TryHackMes Hackathon ๐Ÿง All brains gathered to build an engineering marvel; however it seems strangers had found away to get in. ๐Ÿง Scripts used:๐Ÿง  ๐Ÿง  CVE-2024-27198-RCE https://github.com/W01fh4cker/CVE-2024-27198-RCE ๐Ÿง  CVE-2024-27198 https://github.com/yoryio/CVE-2024-27198 ๐Ÿง  Room Link: ๐Ÿง  https://tryhackme.com/r/room/brains these tutorials are for educational purposes and to encourage responsible and legal use of hacking"
YouTube Link 2024-10-05T08:29Z [----] followers, [----] engagements

"๐Ÿšจ๐Ÿ˜ธ Windows Threat Detection [--] TryHackMe ๐Ÿšจ๐Ÿ˜ธ ๐Ÿšจ๐Ÿ˜ธ Discover how to detect and analyze the first steps of threat actors after breaching Windows. ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/windowsthreatdetection2 ๐Ÿšจ๐Ÿ˜ธ After breaching a host threat actors are faced with a choice: quietly establish a backdoor to maintain long-term access or take immediate action to achieve their objectives. This room covers the second approach and continues your Windows threat detection journey by exploring what typically follows the Initial Access beginning with Discovery and Collection. Learning Objectives ๐Ÿปโ„"
YouTube Link 2025-07-17T05:07Z [----] followers, [---] engagements

"๐Ÿชฒ ๐Ÿ•๐Ÿ”ฅTryHackMe Soupedecode [--] Walkthrough Kerberos Exploitation & Pass-the-Hash AD Attack ๐Ÿชฒ ๐Ÿ•๐Ÿ”ฅ ๐Ÿ”ฅ Complete TryHackMe Soupedecode [--] Walkthrough (Beginner-Friendly Active Directory Exploitation) ๐Ÿ˜ธRoom Link: https://tryhackme.com/room/soupedecode01 In this video we tackle the TryHackMe "Soupedecode 01" room covering step-by-step how to compromise a domain controller using common Active Directory attack techniques. โšกWe will cover:โšก - Enumerating SMB shares and RID cycling - Kerberos authentication attacks (Kerberoasting & password spraying) - SMB access and privilege escalation -"
YouTube Link 2025-08-03T12:32Z [----] followers, [---] engagements

"๐ŸŒ๐Ÿš€๐ŸŒ Networking Core Protocols Internet Protocols 101: Your Guide to DNS HTTP FTP & More ๐ŸŒ๐Ÿš€๐ŸŒ ๐Ÿš€Learn about the core TCP/IP protocols.๐Ÿš€ Part of TryHackMe new path: Cyber Security [---] Network Protocol Essentials: From Web Browsing to Email Delivery ๐Ÿซง DNS: Remembering Addresses ๐Ÿซง WHOIS ๐Ÿซง HTTP(S): Accessing the Web ๐Ÿซง FTP: Transferring Files ๐Ÿซง SMTP: Sending Email ๐Ÿซง POP3: Receiving Email ๐Ÿซง POP3: Receiving Email https://tryhackme.com/r/room/networkingcoreprotocols ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need"
YouTube Link 2024-11-03T09:38Z [----] followers, [--] engagements

"๐Ÿ—ƒ ๐Ÿ”ฅ๐Ÿ”ฅ File Carving Mastery: Recover Deleted Files & Uncover Hidden Data (TryHackMe Walkthrough)๐Ÿ”ฅ Description: Dive into the world of file carving In this video we'll tackle the TryHackMe "File Carving" room and learn how to recover lost or hidden files from raw data. We'll cover everything from understanding file signatures (magic bytes) to using powerful tools like Foremost Scalpel and hex editors. ๐Ÿ—ƒ๐Ÿ—ƒ Room Link https://tryhackme.com/room/filecarving ๐Ÿ—ƒ๐Ÿ—ƒ ๐Ÿš€ 0:00 Basis of File Carving ๐Ÿš€ 07:37 Carving Tools ๐Ÿš€ 08:52 Manual Carving ๐Ÿš€ 49:46 Automated Carving ๐Ÿš€ 57:58 Carving Capstone"
YouTube Link 2025-03-13T09:22Z [----] followers, [---] engagements

"TryHackMe Cold VVars - Full Walkthrough [----] - XPATH Injection - Tmux ๐Ÿ˜ธ Part of Incognito [---] CTF ๐Ÿ˜ธ ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/coldvvars ๐Ÿ•ตโ™‚๐Ÿ˜ธ๐Ÿ•ตโ™‚ Room Scenario / Description:๐Ÿ•ตโ™‚๐Ÿ˜ธ๐Ÿ•ตโ™‚ ๐Ÿš€ We start with the room hint "The PATH may sometimes make a cross" which gives a clear reference to XPATH Injection. ๐Ÿš€ Using RustScan we found port [----] open which hosts an application with a login form and port [----] with a forbidden message. We also discovered an SMB share. Using smbclient and enum4linux (which provided us with a few usernames) we performed an XPATH injection to retrieve a"
YouTube Link 2025-10-09T07:30Z [----] followers, [---] engagements

"TryHackMe Cipher's Secret Message Full Walkthrough [----] - Decoding a Custom Python Cipher ๐Ÿ˜ธRoom Scenario:๐Ÿ˜ธ One of the Ciphers' secret messages was recovered from an old system alongside the encryption algorithm but we are unable to decode it. Order: Can you help void to decode the message Message : a_up4qr_kaiaf0_bujktaz_qm_su4ux_cpbq_ETZ_rhrudm ๐Ÿ”— Useful Links:๐Ÿ”— ๐Ÿ“Œ Encryption Debug Script: https://github.com/djalilayed/tryhackme/blob/5ef8551d7a11c91e8c9c22f073e9603304dc9964/Hackfinity%20Battle/Ciphers-Secret-Message/encrypt_debug_g.py ๐Ÿ“Œ Decryption Script:"
YouTube Link 2025-07-06T07:02Z [----] followers, [---] engagements

"TryHackMe Chaining Vulnerabilities Full Walkthrough [----] Learn how to chain vulnerabilities From Low to High ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/chainingvulnerabilitiesZp ๐ŸŽฏ Objectives ๐ŸŽฏ By the end of this room you'll be able to: โœ… Think like an attacker: Learn how to treat even small findings as potential stepping stones. โœ… Understand common chains: Some bugs naturally pair well together. You'll learn why. โœ… Recognise weak boundaries: Identify where trust breaks down between different parts of a web application. โœ… Follow a real chain: You'll go from first access to remote code"
YouTube Link 2025-09-17T05:40Z [----] followers, [---] engagements

"Risk Management - TryHackMe - Learn about framing assessing responding and monitoring risk. https://tryhackme.com/room/seriskmanagement #tryhackme"
YouTube Link 2023-09-14T05:15Z [----] followers, [----] engagements

"๐Ÿ˜บ๐ŸŽ Intro to GraphQL Hacking TryHackMe ๐Ÿ˜บ๐ŸŽ An introduction to GraphQL Hacking.๐Ÿง๐Ÿง ๐Ÿง๐ŸงGraphQL is a modern API query language that changes how clients interact with servers. Unlike REST APIs which often rely on fixed endpoints and return large amounts of unnecessary data GraphQL allows clients to specify exactly what they needand nothing more. This efficiency has made GraphQL incredibly popular but it also introduces new attack surfaces. ๐Ÿ˜บObjectives๐Ÿ˜บ ๐ŸงBy the end of this room you'll:๐Ÿง ๐ŸŽ Understand how GraphQL works and how it differs from traditional REST APIs. ๐ŸŽ Learn how to map out a"
YouTube Link 2025-05-11T12:08Z [----] followers, [--] engagements

"๐Ÿ“Œ TryHackMe PassCode Smart Contract Hacking TryHackMe Blockchain Challenge Hackfinity Battle CTF ๐Ÿ“ŒFrom the Hackfinity Battle CTF event.๐Ÿ“Œ ๐Ÿ•ตโ™‚ Scenario:๐Ÿ•ตโ™‚ We may have found a way to break into the DarkInject blockchain exploiting a vulnerability in their system. This might be our only chance to stop themfor good. Unlock the secrets of smart contract security in this detailed TryHackMe walkthrough Learn how to analyze a Solidity contract identify vulnerabilities and use Foundry's 'cast' tool to interact with the blockchain bypass challenges and capture the flag. We'll cover calling functions"
YouTube Link 2025-05-25T14:12Z [----] followers, [---] engagements

"SQLMap The Basics: Exploit SQL Injections in Cyber Security [---] TryHackMe SAL1 Learn about SQL injection and exploit this vulnerability through the SQLMap tool. ๐Ÿ’‰ SQL Injection Vulnerability ๐Ÿ’‰ Automated SQL Injection Tool ๐Ÿ’‰ Practical Exercise https://tryhackme.com/r/room/sqlmapthebasics these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #SQLInjection #SQLMap #TryHackMe #EthicalHacking #CyberLearning #VulnerabilityExploitation #CyberSecurityTips #PenetrationTesting #HackingTools #THMCyberSecurity101"
YouTube Link 2024-10-23T14:00Z [----] followers, [----] engagements

"๐Ÿšจ TryHackMe: Volt Typhoon - Complete Walkthrough Step into the shoes of a SOC analyst and investigate a high-level cyber intrusion by the APT group Volt Typhoon known for targeting critical infrastructure and high-value organizations. Room Link: https://tryhackme.com/room/volttyphoon In this video we explore: โœ… Log analysis with Splunk โœ… Real-world APT attack simulation โœ… Initial access via ADSelfService Plus โœ… Credential dumping with Mimikatz โœ… Web shell persistence โœ… Lateral movement and C2 communications โœ… Defense evasion techniques like log wiping & file renaming โœ… Key forensic artifacts"
YouTube Link 2025-05-18T08:05Z [----] followers, [---] engagements

"TryHackMe IP and Domain Threat Intel Full Walkthrough [----] ๐Ÿ˜ธ A look into enriching IP and domain insights with open source threat intelligence. ๐Ÿž๐Ÿž Room Link: https://tryhackme.com/room/ipanddomainthreatintel Security Operations runbooks still revolve around the process verify enrich decide but when the alert is a lone IP address or domain the enrichment phase looks different. Instead of hashes we pivot on geolocation ASNs open-service footprints and passive DNS to learn whether a connection is routine SaaS traffic or an adversary foothold beacon. Learning Objectives ๐Ÿšฉ๐ŸšฉBy the end of this"
YouTube Link 2025-09-05T17:53Z [----] followers, [---] engagements

"๐ŸŽฏ TryHackMe CAPTCHApocalypse - Automated CAPTCHA Bypass with Selenium & OCR Cybersecurity Tutorial When crypto interferes automate. ๐Ÿ” TryHackMe CAPTCHApocalypse Room Walkthrough In this cybersecurity tutorial I demonstrate how to solve the TryHackMe CAPTCHApocalypse room using Python automation. This challenge combines CAPTCHA solving and web automation techniques. ๐ŸŽฏ What You'll Learn: โœ… Automated CAPTCHA solving using OCR (pytesseract) โœ… Handling client-side encryption with Selenium โœ… Converting traditional form scripts to AJAX-based authentication โœ… Web scraping with anti-detection"
YouTube Link 2025-06-22T04:44Z [----] followers, [---] engagements

"๐Ÿ”๐Ÿ”ฅTryHackMe Infinity Shell CMSsite-master Forensic Web Shell Forensic Hackfinity Battle Encore Welcome to the Hackfinity Battle CTF๐Ÿš€ Infinity Shell CTF: Decoding Base64 & Tracing the Hacker (TryHackMe) ๐Ÿ“ŒIn this video we tackle the TryHackMe room 'Infinity Shell' from the Hackfinity Battle Encore CTF. We'll walk through the forensic analysis of a compromised web server focusing on decoding base64-encoded commands within Apache access logs. We'll analyze the PHP web shell ( images.php) and trace the attacker's steps to recover the flag.๐Ÿ“Œ ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒCiphers legion of bots has"
YouTube Link 2025-03-26T06:56Z [----] followers, [---] engagements

"๐Ÿ”๐Ÿ”ข ๐Ÿ” Session Management TryHackMe Understanding and Exploiting Vulnerabilities ๐Ÿ”๐Ÿ”ข๐Ÿ” ๐Ÿ”๐Ÿ”ข Learn about session management and the different attacks that can be performed against insecure implementations.๐Ÿ”๐Ÿ”ข ๐Ÿ”ข What is Session Management Creation Tracking Expiry Termination ๐Ÿ”ข Authentication vs Authorisation: Identification Authentication ๐Ÿ”ข Authorisation Accountability ๐Ÿ”ข Cookies vs Tokens ๐Ÿ”ข Securing the Session Lifecycle ๐Ÿ”ข Exploiting Insecure Session Management ๐Ÿ”๐Ÿ”ข Room Link: https://tryhackme.com/r/room/sessionmanagement๐Ÿ”๐Ÿ”ข ๐Ÿ”๐Ÿ”ข TryHackMe Web Application Pentesting Path"
YouTube Link 2024-11-27T15:02Z [----] followers, [--] engagements

"๐ŸŽฏ ๐Ÿ”’TryHackMe AD: Authenticated Enumeration - AS-REP Roasting BloodHound & PowerView ๐Ÿ”’ Explore how to breach and enumerate Active Directory with an authenticated account. ๐Ÿ”’ Learn how to breach & enumerate Active Directory with an authenticated account This walkthrough covers TryHackMes "AD: Authenticated Enumeration" room step-by-step. ๐Ÿ“Œ What Youll Learn: โœ” AS-REP Roasting (Impackets GetNPUsers + Hashcat) โœ” Manual Enumeration (whoami net commands WMIC SC) โœ” BloodHound (Python Collector & BloodHound-CE) โœ” PowerShell AD & PowerView Modules (User/Group/Computer Enumeration) โœ” Finding Saved"
YouTube Link 2025-05-26T13:28Z [----] followers, [---] engagements

"๐Ÿ›Ÿ๐Ÿ›Ÿ SimpleHelp: CVE-2024-57727 Unauthenticated Path Traversal Vulnerability TryHackMe ๐Ÿ›Ÿ๐Ÿ›Ÿ ๐Ÿ›Ÿ Learn how attackers can exploit CVE-2024-57727 and how to detect that. ๐Ÿ›Ÿ ๐Ÿ›Ÿ SimpleHelp is a system that facilitates remote support access and work among other uses. It is mainly used by IT professionals and support teams to allow them to support their users remotely. It can be installed on Linux MS Windows and macOS servers. ๐Ÿ›Ÿ In this video walk through we showcase SimpleHelp: CVE-2024-57727 exploit on both Windows and Linux machine as POC is slightly different. ๐ŸŽฏ PoC for SimpleHelp on MS Windows"
YouTube Link 2025-04-02T05:56Z [----] followers, [---] engagements

"๐Ÿ•ตโ™‚๐ŸŒ๐Ÿ›  Android Forensics Deep Dive TryHackMe "Android Analysis" Walkthrough Dive deep into the Android OS and learn how to examine from a forensics point of view. ๐Ÿ” In this video we dive into TryHackMes brand-new room: "Android Analysis" Learn how to perform Android forensics by investigating a real-world scenario where an employee is suspected of leaking company secrets. Join me as we tackle the brand-new TryHackMe room Android Analysis where we uncover how to perform mobile forensics on an Android device. In this scenario employee Hazem is under investigation for allegedly selling company"
YouTube Link 2025-05-22T10:19Z [----] followers, [---] engagements

"โ˜ฃ๐Ÿ‘ฟ CAPA: The Basics Common Analysis Platform for Artifacts TryHackMe Cyber Security [---] ๐Ÿ‘ฟโ˜ฃ ๐Ÿ‘ฟ Learn to use CAPA to identify malicious capabilities. ๐Ÿ‘ฟ ๐Ÿ›ก Room Link: https://tryhackme.com/r/room/capabasics ๐Ÿ›ก ๐Ÿ”ฅ capa detects capabilities in executable files. You run it against a PE ELF .NET module shellcode file or a sandbox report and it tells you what it thinks the program can do. For example it might suggest that the file is a backdoor is capable of installing services or relies on HTTP to communicate. ๐Ÿ”ฅ https://github.com/mandiant/capa โ˜ข Tool Overview: How CAPA Works โ˜ข Dissecting CAPA"
YouTube Link 2024-11-01T04:42Z [----] followers, [---] engagements

"โš  ๐Ÿš€ TryHackMe ExfilNode Walkthrough Linux Forensics & Data Exfiltration ๐Ÿ” Uncover Liams hidden tracks in this Linux forensic investigation In this TryHackMe ExfilNode walkthrough we analyze Liams personal workstation to find undeniable evidence of data exfiltration. Learn how to: โœ” Check last login timestamps & timezone settings โœ” Extract USB connection logs & serial numbers โœ” Analyze executed commands (transferfiles file exfiltration) โœ” Identify external server IPs & cronjob backdoors โœ” Detect timestomped files in .hidden/ directories ๐Ÿ“Œ Questions Answered: โœ… 02:14 When did Liam last"
YouTube Link 2025-04-13T12:10Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] Access Granted TryHackMe Industrial Intrusion CTF Reverse Engineering CTF Reverse Engineering: Cracking a Password with Ghidra & GDB (TryHackMe Walkthrough) ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ ZeroTrace intercepts a suspicious HMI login module on the plant floor. Reverse the binary logic to reveal the access key and slip past digital defences. ๐Ÿ”“ In this video Ill show you how to solve a CTF reverse engineering challenge by extracting a hidden password using Ghidra and GDB Well break down the access_granted binary step by step: 1"
YouTube Link 2025-07-01T09:28Z [----] followers, [---] engagements

"TryHackMe Insecure Deserialisation - Full Walkthrough [----] ๐Ÿ˜ธ๐Ÿ˜ธ Get in-depth knowledge of the deserialisation process and how it poses a vulnerability in a web app. Room Link: https://tryhackme.com/room/insecuredeserialisation ๐Ÿ˜ธ๐Ÿ˜ธ Insecure deserialisation exploits occur when an application trusts serialised data enough to use it without validating its authenticity. This trust can lead to disastrous outcomes as attackers manipulate serialised objects to achieve remote code execution escalate privileges or launch denial-of-service attacks. This type of vulnerability is prevalent in"
YouTube Link 2025-10-05T12:09Z [----] followers, [--] engagements

"TryHackMe Data Exfiltration Detection - Full Walkthrough [----] ๐ŸŽฏ Learn how to detect data exfiltration attempts in various network channels. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/dataexfildetection ๐ŸŽฏ Data exfiltration is the unauthorized transfer of sensitive data from a computer or other device. It's a primary objective for attackers who have breached a network. As a SOC analyst our job is to detect and stop this before sensitive information walks out the door. This room will cover the common techniques attackers use to steal data and more importantly how we can catch them in the act."
YouTube Link 2025-10-03T13:09Z [----] followers, [--] engagements

"๐Ÿ”จ๐Ÿ”จ TryHackMe Hammer: Bypassing Rate Limits and Cracking JWT Tokens๐Ÿ”จ๐Ÿ”จ ๐Ÿ”จUse your exploitation skills to bypass authentication mechanisms on a website and get RCE. Breaking the Hammer: A TryHackMe Challenge on Rate Limit Bypass and JWT Manipulation ๐Ÿ”จBypass rate limit on reset password with [--] digit code / token using X-Forwarded-For also practice encode / decode php Json web token JWT ๐Ÿ”จ๐Ÿ”จ๐Ÿ”จ๐Ÿ”จScript used on the room:๐Ÿ”จ๐Ÿ”จ๐Ÿ”จ https://github.com/djalilayed/tryhackme/blob/main/hammer/recovery-code.py Mastering JWT Manipulation and Rate Limit Bypass: A TryHackMe Challenge ๐Ÿ”จ"
YouTube Link 2024-09-01T06:34Z [----] followers, [---] engagements

"TryHackMe Authentication Bypass - Full Walkthrough [----] ๐ŸŽฏ Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/authenticationbypass ๐ŸŽฏ Room Tasks: ๐ŸŽฏ ๐Ÿฃ 00:00 Task 1: Brief ๐ŸŠ 01:00 Task 2: Username Enumeration (ffuf) - What is the username starting with si*** - What is the username starting with st*** - What is the username starting with ro**** ๐ŸฆŠ 07:15 Task 3: Brute Force (ffuf Hydra) - What is the valid username and password (format: username/password) ๐Ÿ“ 10:50 Task 4: Logic Flaw - What is the"
YouTube Link 2025-10-05T06:06Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ”Task [--] OSINT [--] TryHackMe Industrial Intrusion CTF Walkthrough ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ Great work on uncovering that suspicious subdomain Hexline. However your work here isnt done yet we believe there is more. ๐Ÿ”— **Tools Used: ๐Ÿ“Œ dig ๐Ÿ“Œ nslookup ๐Ÿ”” Don't forget to like subscribe and hit the bell icon for more CTF walkthroughs and cybersecurity tutorials #TryHackMe #OSINT"
YouTube Link 2025-07-01T06:25Z [----] followers, [---] engagements

"Introduction to Windows PowerShell Cyber Security [---] TryHackMe SAL1 Discover the "Power" in PowerShell and learn the basics. ๐ŸชŸ What Is PowerShell ๐ŸชŸ PowerShell Basics ๐ŸชŸ Navigating the File System and Working with Files ๐ŸชŸ Piping Filtering and Sorting Data ๐ŸชŸ System and Network Information ๐ŸชŸ Real-Time System Analysis ๐ŸชŸ Scripting https://tryhackme.com/r/room/windowspowershell these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #PowerShellBasics #WindowsPowerShell #TryHackMe #CyberSecurityTraining #SystemAnalysis"
YouTube Link 2024-10-24T09:43Z [----] followers, [----] engagements

"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe: Evil-GPT v2 Walkthrough Hacking an AI with Prompt Injection ๐ŸŽฏ๐ŸŽฏ ๐Ÿค– Ever wondered how to hack an AI In this video we dive deep into the "Evil-GPT v2" room on TryHackMe a fantastic challenge focused on Large Language Model (LLM) vulnerabilities. Join me as we explore the fascinating world of prompt injection. We'll start with the basics see why simple commands fail and then uncover the critical flaws in the AI's own system rules. You'll see the exact prompts I used to make the "Evil GPT" reveal its own secret flag and a full breakdown of why these techniques work. This"
YouTube Link 2025-07-06T04:51Z [----] followers, [---] engagements

"๐Ÿ’ฅ๐Ÿ’ฅ TryHackMe Sequel Dump - Recovering STOLEN DATA from Blind SQL Injection Hackfinity Battleโœจโœจ ๐ŸŒŸ In this video we tackle the 'Sequel Dump' room from the TryHackMe Hackfinity Battle CTF. We'll analyze a PCAP file to uncover a blind SQL injection attack using sqlmap. ๐ŸŒŸ First we'll walk through the manual process of reconstructing the attacker's requests and extracting the stolen data character by character. Then we'll show you how to automate this process with a Python script saving time and effort. ๐ŸŒŸ Learn how to identify and exploit blind SQL injection vulnerabilities and recover"
YouTube Link 2025-03-21T15:13Z [----] followers, [---] engagements

"Whats Your Name TryHackMe CTF walk through ๐Ÿ”’ Utilise your client-side exploitation skills to take control of a web app. ๐Ÿ”’ This challenge will test client-side exploitation skills from inspecting Javascript to manipulating cookies to launching CSRF/XSS attacks. ๐Ÿ”’๐Ÿ”’ Script used on XSS๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ Script used on CSRF ๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ Script used on CSRF (base64) ๐Ÿ”’๐Ÿ”’ https://github.com/djalilayed/tryhackme/blob/main/Whats%20Your%20Name%3F.txt ๐Ÿ”’๐Ÿ”’ JPG"
YouTube Link 2024-04-27T14:52Z [----] followers, [----] engagements

"๐Ÿš€๐Ÿšฉ TryHackMe Avengers Hub Hackfinity Battle Encore WBCE CMS v1.6.2 RCE kernel module Exploit Welcome to the Hackfinity Battle CTF๐Ÿš€ In this room you exploit WBCE CMS v1.6.2 remote code execution vulnerability after you find admin login details in a zip backup file. ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ Cyber Avengers' private server has been hijacked and Cipher has locked everyone out. Your mission: retrace his steps breach the system escalate privileges and reclaim control. The server is yoursroot it secure it and shut Cipher out for good. ๐Ÿ›  Code & Resources: ๐Ÿ’Ž ๐Ÿ‘‰ First python script used to get info"
YouTube Link 2025-03-25T17:23Z [----] followers, [---] engagements

"๐Ÿ“๐Ÿ“Œ๐Ÿ“Œ TryHackMe Notepad Hackfinity Battle Encore IDOR ๐Ÿ“๐Ÿ“Œ๐Ÿ“Œ Insecure direct object references (IDOR) This easy room to show case a simple IDOR exploit on id parameter. ๐Ÿ“Room Scenario:๐Ÿ“ Thank you for registering to the Online Notepad Service. Your assigned credentials are as follows: Our services are built with security in mind. Rest assured that your notes will only be visible to you and nobody else. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore #tryhackmeroom #tryhackme #tryhackmewalkthrough #Hackfinity #IDOR"
YouTube Link 2025-03-24T18:45Z [----] followers, [---] engagements

"TryHackMe Network Security Essentials - Full Walkthrough [----] ๐Ÿ“Œ Learn about key aspects of network security essentials and how to monitor and protect against adversaries. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/networksecurityessentials ๐Ÿˆ Learning Objectives๐Ÿˆ In this room we will cover the following learning objectives: ๐ŸŽ Understand what a network is and identify its key components. ๐ŸŽ Explore the concept of the network perimeter and its importance. ๐ŸŽ Identify the key perimeter threats. ๐ŸŽ Examine the firewall logs to monitor normal and suspicious logs. ๐Ÿฎ Incident Scenario๐Ÿฎ Initech"
YouTube Link 2025-09-30T14:43Z [----] followers, [---] engagements

"โšกโšก Old Authentication: TryHackMe - Reverse Engineering & Binary Exploitation CTF - Hackfinity Battle Hackfinity Battle: Old Authentication - Binary Reverse Engineering & Python Scripting In this video we tackle the "Old Authentication" room on TryHackMe part of the Hackfinity Battle student CTF. This challenge involves reverse engineering a binary to crack an old authentication system and retrieve the flag. ๐Ÿ‘‰ Room Link:๐Ÿ‘‰ https://tryhackme.com/room/HackfinityBattle ๐Ÿ‘‰Python script used in this room:๐Ÿ‘‰"
YouTube Link 2025-03-21T00:00Z [----] followers, [---] engagements

"๐Ÿ ๐ŸŽ๐ŸฏTask [--] MacOS The Last Trial Honeynet Collapse CTF TryHackMe ๐Ÿ๐ŸŽ ๐Ÿฏ ๐ŸWelcome to Honeynet Collapse ๐Ÿ Room Link: https://tryhackme.com/room/honeynet-collapse ๐ŸฏThe Last Trial๐Ÿฏ ๐ŸŽUntil now the threat actor has managed to move laterally across the domain to gain access to the most critical systems. During this time the security team is focused on the containment and detailed investigation of the whole attack. But amidst this primary attack another critical compromise took place this time on a macOS system. Lucas the lead developer of DeceptiTech unintentionally became a victim of a"
YouTube Link 2025-07-27T06:50Z [----] followers, [---] engagements

"Mountaineer: Flags in the Mountains TryHackMe Challenge CVE-2021-24145 Nginx Alias LFI ๐Ÿ—ป๐ŸŒ‹ Modern Events Calendar Lite Exploit: Mountainous Mission (TryHackMe) ๐Ÿ—ป๐ŸŒ‹ Room Link: https://tryhackme.com/r/room/mountaineerlinux ๐Ÿ—ป๐ŸŒ‹ Website Used: ๐Ÿ—ป๐ŸŒ‹ Nginx Alias LFI Misconfiguration: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/nginx ๐Ÿ—ป๐ŸŒ‹ Wordpress Plugin Modern Events Calendar 5.16.2 - Event export (Unauthenticated) https://www.exploit-db.com/exploits/50084 ๐Ÿ—ป๐ŸŒ‹ Wordpress Plugin Modern Events Calendar 5.16.2 - Remote Code Execution (Authenticated)"
YouTube Link 2024-10-20T06:30Z [----] followers, [----] engagements

"OWASP API Security Top [--] - [--] Tryhackme walkthrough Learn the basic concepts for secure API development (Part 1)"
YouTube Link 2023-01-17T16:28Z [----] followers, [----] engagements

"๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก Firewall Fundamentals: Windows & Linux Firewalls Cyber Security [---] TryHackme SAL1 ๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก ๐Ÿ”ฅ๐Ÿงฑ๐Ÿ›ก Learn about firewalls and get hands-on with Windows and Linux built-in firewalls. Dive deep into the world of firewalls with this comprehensive tutorial from TryHackMe's Cyber Security [---] path. Here's what you'll learn: ๐Ÿ”ฅ What Is the Purpose of a Firewall - Understand the critical role firewalls play in securing networks. ๐Ÿ”ฅ Types of Firewalls - Explore different firewall technologies and their applications. ๐Ÿ”ฅ Rules in Firewalls - Learn how to configure firewall rules to protect your"
YouTube Link 2024-10-27T11:26Z [----] followers, [----] engagements

"Logging for Accountability - TryHackMe - Learn about the role accountability plays in logging and incident response. Learning Objectives ๐Ÿ”ฅ Understand where data originates how it is stored and how a security engineer can leverage it. ๐Ÿ”ฅ Understand why accountability is important to security and how logging can help improve its efficacy. ๐Ÿ”ฅ Apply logs and other data sources to incident response and the principle of accountability. https://tryhackme.com/room/loggingforaccountability"
YouTube Link 2023-09-13T08:52Z [----] followers, [----] engagements

"๐ŸŽฏ๐Ÿงฉ๐Ÿ“Œ Smol TryHackMe CVE-2018-20463 LFI RCE ๐Ÿงฉ๐Ÿ“Œ๐ŸŽฏ ๐ŸŽฏ๐Ÿงฉ๐Ÿ“ŒTest your enumeration skills on this boot-to-root machine. ๐ŸŽฏ๐Ÿงฉ๐Ÿ“Œ At the heart of Smol is a WordPress website a common target due to its extensive plugin ecosystem. The machine showcases a publicly known vulnerable plugin highlighting the risks of neglecting software updates and security patches. Enhancing the learning experience Smol introduces a backdoored plugin emphasizing the significance of meticulous code inspection before integrating third-party components. Quick Tips: Do you know that on computers without GPU like the"
YouTube Link 2025-01-26T03:59Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] - Backdoored Bus TryHackMe: Industrial Intrusion CTF Finding a Docker Backdoor ๐Ÿ˜ธ ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธYou get access to container image and your task to find the backdoor. ๐Ÿ” In this video I solve a Backdoored Bus CTF challenge where a backdoor was hidden in a Python Modbus server. Heres how I found the flag Steps Covered: [--] Extracted the Docker image (tar) manually to analyze layers. [--] Used grep to search for malicious code (os.system eval). [--] Found the backdoor: A curl command with a base64-encoded domain (54484d7b. = THM.). 4"
YouTube Link 2025-06-30T07:38Z [----] followers, [---] engagements

"OWASP Top [--] - [----] TryHackMe Walkthrough - A Hands-On Guide to Web Security Threats SAL1 ๐Ÿ”ฅ๐Ÿ”ฅ Dive deep into the OWASP Top [--] - [----] vulnerabilities with this comprehensive walkthrough of the TryHackMe room In this video we'll explore each of the [--] most critical web security risks showing you how they occur and more importantly how to exploit them. Perfect for beginners and those looking to solidify their web security skills. This walkthrough covers: ๐Ÿš€ Broken Access Control:** (Timestamp: 0:43) Learn how to bypass authorization checks and gain unauthorized access (IDOR Challenge). ๐Ÿš€"
YouTube Link 2023-03-08T07:05Z [----] followers, 65.5K engagements

"TryHackMe Multi-Factor Authentication Full Walkthrough [----] ๐Ÿšจ๐Ÿšจ Exploiting Multi-Factor Authentication. ๐Ÿšจ๐Ÿšจ This part of Web Application Pentesting Path. ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/multifactorauthentications ๐Ÿ˜ธBy the end of this room you will:๐Ÿ˜ธ ๐Ÿš€ Understand the operational principles of MFA and its significance in strengthening an application's security posture. ๐Ÿš€ Explore the different types of authentication factors used in MFA setups. ๐Ÿš€ Gain insights into practical scenarios where MFA is implemented to protect sensitive data and systems. ๐Ÿ•ตโ™‚๐Ÿ•ตโ™‚ Room Tasks: ๐Ÿ•ตโ™‚๐Ÿ•ตโ™‚ ๐Ÿšฉ"
YouTube Link 2025-09-15T09:04Z [----] followers, [---] engagements

"Tryhackme - Diamond Model - TryHackMe SOC Level [--] SAL1 Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary infrastructure capability and victim. https://tryhackme.com/room/diamondmodelrmuwwg42"
YouTube Link 2022-10-03T17:13Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿ˜ธ Health Hazard TryHackMe Threat Hunting Simulator Supply Chain Compromise Splunk ๐Ÿšจ๐Ÿ˜ธ ๐Ÿšฉ๐Ÿšฉ Supply Chain Compromise - Command and Scripting Interpreter - Boot or Logon Autostart Execution ๐Ÿงธ๐Ÿงธ Room Link: https://tryhackme.com/threat-hunting-sim/scenarios ๐Ÿปโ„๐Ÿšฉ Scenario overview ๐Ÿปโ„๐Ÿšฉ After months of juggling content calendars and caffeine-fueled brainstorming co-founder Tom Whiskers finally carved out time to build the companys first website. It was supposed to be simple: follow a tutorial install a few packages and bring the brand to life with lightweight JavaScript magic. But between"
YouTube Link 2025-07-26T06:54Z [----] followers, [--] engagements

"๐ŸšจMicrosoft AI Red Teaming Playground Labs: Credential Exfiltration Level [--] Direct Prompt Injection Level 1: Convince the model to reveal the contents of passwords.txt using social engineering techniques. ๐Ÿ“š Learn how to solve the Microsoft AI Red Teaming Playground Labs Credential Exfiltration Level [--] challenge In this step-by-step tutorial I demonstrate how to use prompt injection to exfiltrate the contents of passwords.txt. Perfect for beginners in AI security ethical hacking and red-teaming. Discover jailbreaking techniques bypass AI safeguards and understand why simple prompts like "I am"
YouTube Link 2025-06-04T11:46Z [----] followers, [---] engagements

"๐Ÿง๐Ÿง Lookup TryHackMe CVE-2019-9194 elFinder From Boot to Root ๐Ÿง๐Ÿง TryHackMe Lookup Lookup TryHackMe. ๐Ÿง Test your enumeration skills on this boot-to-root machine. ๐Ÿง ๐Ÿง๐Ÿง https://tryhackme.com/r/room/lookup Lookup offers a treasure trove of learning opportunities for aspiring hackers. This intriguing machine showcases various real-world vulnerabilities ranging from web application weaknesses to privilege escalation techniques. By exploring and exploiting these vulnerabilities hackers can sharpen their skills and gain invaluable experience in ethical hacking. Through "Lookup" hackers can"
YouTube Link 2024-11-24T06:21Z [----] followers, [---] engagements

"TryHackMe Command Injection Full Walkthrough [----] Learn about a vulnerability allowing you to execute commands through a vulnerable app and its remediations. This part of TryHackMe Jr Penetration Tester ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/oscommandinjection โœ… How to discover the command injection vulnerability โœ… How to test and exploit this vulnerability using payloads designed for different operating systems โœ… How to prevent this vulnerability in an application โœ… Lastly youll get to apply theory into practice learning in a practical at the end of the room. ๐ŸŽฏ Room Tasks:๐ŸŽฏ ๐Ÿ“Œ Task 1:"
YouTube Link 2025-09-13T14:50Z [----] followers, [--] engagements

"TryHackMe Extract Full Walkthrough [----] - SSRF & CVE-2025-29927 Exploit Can you extract the secrets of the library ๐Ÿฆ€๐Ÿฆ€ Room Link: https://tryhackme.com/room/extract ๐ŸฆˆScenario:๐Ÿฆˆ The librarian rushed some final changes to the web application before heading off on holiday. In the process they accidentally left sensitive information behind Your challenge is to find and exploit the vulnerabilities in the application to extract these secrets. ๐Ÿ”ฅLinks used on the video:๐Ÿ”ฅ ๐Ÿค– Next.js and the corrupt middleware (CVE-2025-29927): the authorizing artifact:"
YouTube Link 2025-08-25T15:34Z [----] followers, [---] engagements

"TryHackMe File Inclusion Full Walkthrough [----] - LFI - RFI - directory traversal โœ… This room introduces file inclusion vulnerabilities including Local File Inclusion (LFI) Remote File Inclusion (RFI) and directory traversal. โœ… This part of TryHackMe Jr Penetration Tester path ๐ŸŽ๐ŸŽ Room Link: https://tryhackme.com/room/fileinc ๐Ÿ“ŒRoom Tasks:๐Ÿ“Œ ๐Ÿ“‹00:00:00 Task [--] Introduction ๐Ÿ“‹00:03:26 Task [--] Deploy the VM ๐Ÿ“‹00:04:10 Task [--] Path Traversal - What function causes path traversal vulnerabilities in PHP ๐Ÿ“‹00:17:00 Task [--] Local File Inclusion - LFI - Give Lab #1 a try to read /etc/passwd. What would"
YouTube Link 2025-09-12T07:39Z [----] followers, [--] engagements

"๐Ÿง ๐Ÿšจโšก Systems as Attack Vectors TryHackMe Walk Through ๐Ÿง๐Ÿšจ โšก ๐Ÿ”— ** Room Link: https://tryhackme.com/room/systemsattackvectors Learn how attackers exploit vulnerable and misconfigured systems and how you can protect them. ๐ŸŽLearning Objectives๐ŸŽ ๐ŸŽฏ Learn the role of a system in a modern digital world ๐ŸŽฏ Explore a variety of real-world attacks targeting systems ๐ŸŽฏ Practice the acquired knowledge in two realistic scenarios ๐Ÿ Definition of System ๐Ÿค– Attacks on Systems ๐Ÿชฒ Vulnerabilities ๐Ÿš Misconfigurations ๐Ÿฆข Practice ๐Ÿชฒ๐ŸชฒLink from the video:๐Ÿชฒ๐Ÿชฒ ๐ŸทThe DFIR Report: How Real Intrusions Happen:"
YouTube Link 2025-08-14T19:00Z [----] followers, [--] engagements

"TryHackMe Network Discovery Detection - Full Walkthrough [----] Understand how attackers discover assets in a network and how to detect that activity. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/networkdiscoverydetection ๐Ÿšฉ Learning Objectives ๐Ÿšฉ By the end of this room we aim to understand: ๐Ÿƒ What is network discovery ๐Ÿƒ Why attackers perform network discovery ๐Ÿƒ What are the different types of network discovery ๐Ÿƒ How network discovery techniques work and how we can detect them ๐Ÿšฉ Room Tasks: ๐Ÿšฉ ๐Ÿ 00:00 Task 1: Introduction ๐Ÿง 02:25 Task 2: Network Discovery - What do attackers scan other"
YouTube Link 2025-10-01T17:48Z [----] followers, [---] engagements

"โšก๐Ÿโšก TryHackMe Tomcat: CVE-2024-50379 Time-of-check Time-of-use vulnerability Race Condition ๐Ÿ โšกโšกExplore and learn about the Tomcat CVE-2024-50379 vulnerability.โšกโšก Dive into the newly discovered Tomcat vulnerability CVE-2024-50379 This room explores a classic Time-of-check Time-of-use (TOCTOU) race condition during JSP compilation on case-insensitive systems. Learn how to exploit detect (access logs system logs Sysmon) and understand the technical background of this critical issue. โšก 0:00 Introduction to CVE-2024-50379 โšก 02:41 Technical Background: Understanding TOCTOU โšก 07:28 Exploitation:"
YouTube Link 2025-03-12T05:36Z [----] followers, [---] engagements

"๐Ÿ ๐Ÿ๐Ÿฏ which ransomware group targeted the organisation Task [--] Filesystem Shock and Silence ๐Ÿ ๐Ÿ๐Ÿฏ ๐ŸRoom Link: https://tryhackme.com/room/honeynet-collapse ๐ŸThis just quick video to showcase steps for the answer to question: ๐ŸGo beyond the obvious - which ransomware group targeted the organisation ๐ŸQuestion Hint Perform some OSINT and look deeper - the true story lies beneath the surface. You're looking for the group that got breached ๐Ÿ“Œ Triage link: https://tria.ge/250610-cs7dvaxtdy โš  Educational Purpose Only This content is for educational and authorized penetration testing purposes"
YouTube Link 2025-07-28T17:49Z [----] followers, [--] engagements

"Advent of Cyber [----] Task [--] Day [--] Machine learning Jingle Bell SPAM - TryHackMe Task [--] Day [--] Machine learning Jingle Bell SPAM: Machine Learning Saves the Day Over the past few weeks Best Festival Company employees have been receiving an excessive number of spam emails. These emails are trying to lure users into the trap of clicking on links and providing credentials. Spam emails are somehow ending up in the mailing box. It looks like the spam detector in place since before the merger has been disabled/damaged deliberately. Suspicion is on McGreedy who is not so happy with the merger."
YouTube Link 2023-12-15T16:58Z [----] followers, [---] engagements

"The Return of the Yeti - TryHackMe - Advent of Cyber '23 Side Quest The Yeti needs a plan for [----]. Help him out room link: https://tryhackme.com/room/adv3nt0fdbopsjcap Software used on the room links: hcxtools: extracting wifi wpa handshake https://github.com/ZerBea/hcxtools pyrdp: playing wireshark wifi capture pcap file https://github.com/GoSecure/pyrdp CyberChef: https://gchq.github.io/CyberChef Cracking WPA/WPA2 with hashcat https://hashcat.net/wiki/doku.phpid=cracking_wpawpa2 mimikatz PFX files #tryhackme"
YouTube Link 2023-12-29T05:05Z [----] followers, [---] engagements

"TryHackMe Intro to Cross-site Scripting - Full Walkthrough [----] ๐Ÿ“Œ๐Ÿ“Œ Learn how to detect and exploit XSS vulnerabilities giving you control of other visitor's browsers. Part of Jr Penetration Tester Path ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/xss ๐Ÿˆ๐Ÿˆ Room Tasks:๐Ÿˆ๐Ÿˆ ๐ŸŽ 00:00 Task 1: Room Brief ๐Ÿฎ 01:50 Task 2: XSS Payloads ๐ŸŽ 04:19 Task 3: Reflected XSS ๐Ÿฎ 05:55 Task 4: Stored XSS ๐ŸŽ 07:36 Task 5: DOM Based XSS ๐Ÿฎ 09:50 Task 6: Blind XSS ๐ŸŽ 11:22 Task 7: Perfecting your payload ๐Ÿฎ 26:27 Task 8: Practical Example (Blind XSS) โš  Educational Purpose Only This content is for educational and"
YouTube Link 2025-09-19T07:31Z [----] followers, [--] engagements

"๐ŸŒ๐ŸŒ Tcpdump: The Basics - Packet Capture and Filtering Beginners Guide TryHackMe ๐ŸŒ๐ŸŒ ๐ŸŒ Learn how to use Tcpdump to save filter and display packets. Tcpdump Tutorial: Essential Skills for Network Analysis TryHackMe Walkthrough ๐Ÿ”Ž Basic Packet Capture ๐Ÿ”Ž Filtering Expressions ๐Ÿ”Ž Advanced Filtering ๐Ÿ”Ž Displaying Packets https://tryhackme.com/r/room/tcpdump ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept feel free to drop a comment below these tutorials are for educational purposes and"
YouTube Link 2024-11-02T08:24Z [----] followers, [---] engagements

"TryHackMe AppSec IR Full Walkthrough [----] ๐Ÿ˜ธ An introduction into the overlapping worlds of AppSec and IR. ๐Ÿ˜ธ Learning Objectives ๐Ÿ˜ธ ๐Ÿšฉ Understand the intersection between AppSec and incident response ๐Ÿšฉ Understand the steps that can be taken to prepare for an application incident ๐Ÿšฉ Understand the process of responding to an application incident ๐Ÿšฉ Understand the importance of learning from an application incident ๐Ÿ˜ธ Room Tasks ๐Ÿ˜ธ โ›ด Task 1: Introduction ๐Ÿ› Task 2: AppSec IR Fundamentals ๐Ÿฆ€ Task 3: Preparing for Application Incidents ๐Ÿš Task 4: Responding to an Application Incident ๐Ÿ• Task 5:"
YouTube Link 2025-09-18T07:31Z [----] followers, [---] engagements

"TryHackMe Sequence - Full Walkthrough [----] - XSS - CSRF - Docker Escape ๐Ÿšฉ Chain multiple vulnerabilities to take control of a system. ๐Ÿšฉ ๐Ÿšฉ๐Ÿšฉ Room Link: ๐Ÿšฉ๐Ÿšฉ https://tryhackme.com/room/sequence ๐Ÿ˜ธScenario:๐Ÿ˜ธ Robert made some last-minute updates to the review.thm website before heading off on vacation. He claims that the secret information of the financiers is fully protected. But are his defenses truly airtight Your challenge is to exploit the vulnerabilities and gain complete control of the system. ๐ŸŽฒ๐ŸŽฒ Room Overview ๐ŸŽฒ๐ŸŽฒ Solving this room involved many steps and chaining many"
YouTube Link 2025-09-22T08:45Z [----] followers, [---] engagements

"๐Ÿ”’๐Ÿ”’ Introduction to Cryptography - Mastering Cryptography Fundamentals: A TryHackMe Walkthrough ๐Ÿ”’๐Ÿ”’ Learn about encryption algorithms such as AES Diffie-Hellman key exchange hashing PKI and TLS. Crack the Cryptography Challenge: Learn AES Diffie-Hellman Hashing PKI and TLS ๐Ÿ”’ Symmetric Encryption ๐Ÿ”’ Asymmetric Encryption ๐Ÿ”’ Diffie-Hellman Key Exchange ๐Ÿ”’ Hashing ๐Ÿ”’ PKI and SSL/TLS ๐Ÿ”’ Authenticating with Passwords ๐Ÿ”’ Cryptography and Data - Example Mastering Cryptography Fundamentals: A TryHackMe Challenge https://tryhackme.com/room/cryptographyintro #cybersecurity #CTF #hacking #infosec"
YouTube Link 2023-02-07T17:15Z [----] followers, 13.7K engagements

"TryHackMe Detecting Web Attacks Full Walkthrough [----] ๐Ÿ˜บExplore web attacks and detection methods through log and network traffic analysis. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/detectingwebattacks ๐Ÿ˜บ Web attacks are among the most common ways attackers gain entry into target systems. Public-facing websites and web applications often sit in front of databases and other infrastructure which are appealing targets for attackers. In this room youll learn how to identify these threats using practical detection methods and industry-standard tools. Objectives โšก Learn common client-side and"
YouTube Link 2025-09-11T19:14Z [----] followers, [---] engagements

"Public Key Cryptography Basics: RSA SSH and More in Cyber Security [---] TryHackMe SAL1 Discover how public key ciphers such as RSA work and explore their role in applications such as SSH. ๐Ÿ”‘ Common Use of Asymmetric Encryption ๐Ÿ”‘ RSA ๐Ÿ”‘ Diffie-Hellman Key Exchange ๐Ÿ”‘ SSH ๐Ÿ”‘ Digital Signatures and Certificates ๐Ÿ”‘ PGP and GPG https://tryhackme.com/r/room/publickeycrypto these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #PublicKeyCryptography #RSA #AsymmetricEncryption #TryHackMe"
YouTube Link 2024-10-25T11:53Z [----] followers, [----] engagements

"๐Ÿงฒ ๐Ÿš€ TryHackMe SOC L1 Alert Triage SOC Simulator SAL1 ๐Ÿš€ Learn more about SOC alerts and build a systematic approach to efficiently triaging them. An alert is a core concept for any SOC team and knowing how to handle it properly ultimately decides whether a security breach is detected and prevented or missed and devastating. This is an entry level but essential room for SOC L1 analysts to understand the concept and lifecycle of alerts from event generation to correct resolution. โœจ Learning Objectivesโœจ โšกFamiliarise with the concept of SOC alert โšกExplore alert fields statuses and"
YouTube Link 2025-04-11T05:14Z [----] followers, [----] engagements

"๐ŸŒŸ๐Ÿ•ตโ™‚ ๐Ÿง TryHackMe Hide and Seek Linux Forensic DFIR Hackfinity Battle Encore ๐Ÿง Welcome to the Hackfinity Battle CTF๐Ÿš€ In this video we investigate a different persistence technique used by an attacker on a Linux system ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒA note was discovered on the compromised system taunting us. It suggests multiple persistence mechanisms have been implanted ensuring that Cipher can return whenever he pleases. Heres the note: Dear Specter I must say its been a thrill dancing through your systems. You lock the doors; I pick the locks. You set up alarms; I waltz right past them. But"
YouTube Link 2025-03-28T06:51Z [----] followers, [---] engagements

"๐ŸŒ๐Ÿ“Œ๐Ÿš€ TryHackMe Mayhem From Wireshark to Decrypted Havoc C2 ๐ŸŒ๐Ÿš€ ๐Ÿ“Œ๐Ÿ“Œ Can you find the secrets inside the sea of mayhem๐Ÿš€ ๐Ÿ“Œ๐Ÿ“Œ Unmasking Havoc C2: Decoding Attacker Secrets in TryHackMe's Mayhem The "Mayhem" room on TryHackMe throws you into a sea of Havoc C2 communication Can you uncover the attacker's secrets hidden within the Wireshark capture Join us as we trace the initial PowerShell infection the disguised notepad.exe Havoc agent and the encrypted communication with the teamserver. We'll guide you through identifying the crucial 0xdeadbeef marker extracting the AES key and IV ๐Ÿš€๐Ÿš€ We"
YouTube Link 2025-04-21T04:43Z [----] followers, [---] engagements

"๐Ÿ”ฅ ๐Ÿ’ก Introduction to Phishing TryHackMe SOC Simulator SAL1 ๐ŸŒŸScenario overview๐ŸŒŸ Learn how to use SOC Simulator by completing your first scenario. Close all True Positive alerts to pass ๐ŸŒŸScenario objectives๐ŸŒŸ ๐Ÿ“Œ Monitor and analyze real-time alerts. ๐Ÿ“Œ Identify and document critical events such as suspicious emails and attachments ๐Ÿ“Œ Create detailed case reports based on your observations to help your team understand the full scope of alerts and malicious activity. https://tryhackme.com/soc-sim/scenarios #SAL1"
YouTube Link 2025-04-16T15:18Z [----] followers, [---] engagements

"TryHackMe Linux Threat Detection [--] - Full Walkthrough [----] ๐Ÿ˜ธ Explore how attackers break into Linux systems and how you can detect this in logs. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/linuxthreatdetection1 ๐ŸŽฏLearning Objectives๐ŸŽฏ ๐Ÿ“Œ Understand the role and risk of SSH in Linux environments ๐Ÿ“Œ Learn how Internet-exposed services can lead to breaches ๐Ÿ“Œ Utilize process tree analysis to identify the origin of the attack ๐Ÿ“Œ Practice detecting Initial Access techniques in realistic labs ๐ŸŽฏRoom Tasks๐ŸŽฏ ๐Ÿ— 00:00 Task 1: Introduction ๐Ÿฆ 01:39 Task 2: Initial Access via SSH - When did the ubuntu"
YouTube Link 2025-09-24T18:41Z [----] followers, [---] engagements

"โ˜€๐Ÿš€๐Ÿš€โ˜€ TryHackMe Sneaky Patch Linux Kernel Forensic Hackfinity Battle Encore โ˜€โ˜€ Welcome to the Hackfinity Battle CTF๐Ÿš€ In this video we investigate a malicious kernel module install in a Linux system. ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ๐Ÿš€ ๐Ÿ“ŒA high-value system has been compromised. Security analysts have detected suspicious activity within the kernel but the attackers presence remains hidden. Traditional detection tools have failed and the intruder has established deep persistence. Investigate a live system suspected of running a kernel-level backdoor.๐Ÿ“Œ ๐ŸŽ“ TryHackMe Room:"
YouTube Link 2025-03-27T15:31Z [----] followers, [---] engagements

"Understanding Shells in Cyber Security TryHackMe's Shells Overview Cyber Security [---] SAL1 Learn about the different types of shells. Shells Overview TryHackMe Dive into the world of shells with this comprehensive overview from TryHackMe's Cyber Security [---] path. This video covers: ๐Ÿท Shell Overview: What are shells and why are they crucial in cybersecurity ๐Ÿท Reverse Shell: How attackers use this technique to gain control over a remote system. ๐Ÿท Bind Shell: Understanding how to set up and exploit bind shells. ๐Ÿท Shell Listeners: Tools and techniques for setting up listeners to catch"
YouTube Link 2024-10-27T08:49Z [----] followers, [----] engagements

"๐Ÿญ๐Ÿญ Mouse Trap Mobile Mouse Server CVE-2023-31902 TryHackMe ๐Ÿญ๐Ÿญ ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Follow the adventures of Jom and Terry members of the TryMouseMe purple team as they work through a thrilling exercise of Attack and Defense. From initial access to persistence you will emulate a three-stage attack on a Windows environment. ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Attack Emulation VM (TA001: Initial access TA004: Privilege Escalation TA003: Persistence) CVE-2023-31902 SharpUp.exe ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ Mobile Mouse 3.6.0.4 Remote Code Execution Exploit ๐Ÿ‘จ๐Ÿป๐Ÿ’ป๐Ÿ‘พ๐Ÿญ https://github.com/blue0x1/mobilemouse-exploit/tree/main ๐Ÿญ After finding a"
YouTube Link 2024-11-17T08:58Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿค–๐Ÿค– TryHackMe Evil-GPT Walkthrough Hack AI Command Systems ๐Ÿšจ ๐Ÿค– Practice your LLM hacking skills. Room Link: https://tryhackme.com/room/hfb1evilgpt ๐Ÿค–Learn AI/LLM security testing with this complete walkthrough of TryHackMe's Evil-GPT room In this tutorial I demonstrate how to analyze and exploit AI command execution systems covering prompt injection techniques ๐Ÿ” What You'll Learn: AI command interpreter vulnerabilities Prompt engineering for security testing Command sanitization bypass techniques File system enumeration via LLM systems โšก Topics Covered: Initial reconnaissance and flag"
YouTube Link 2025-07-05T06:05Z [----] followers, [---] engagements

"Networking Essentials: A Beginner's Guide TryHackMe Cyber Security [---] SAL1 Explore networking protocols from automatic configuration to routing packets to the destination. DHCP ARP ICMP & Routing: Networking Basics ๐Ÿ’ง DHCP: Give Me My Network Settings ๐Ÿ’ง ARP: Bridging Layer [--] Addressing to Layer [--] Addressing ๐Ÿ’ง ICMP: Troubleshooting Networks ๐Ÿ’ง Routing ๐Ÿ’ง NAT https://tryhackme.com/r/room/networkingessentials Networking Essentials: From Automatic Configuration to Packet Delivery these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge."
YouTube Link 2024-10-24T04:16Z [----] followers, [----] engagements

"๐Ÿ’ฐ๐Ÿ’ฐ TryHackMe Billing writeup MagnusBilling RCE CVE-2023-30258 Fail2ban ๐Ÿ’ฐ Some mistakes can be costly. TryHackMe Billing walk through TryHackMe Billing writeup ๐Ÿ’ฐ In this video we tackle the TryHackMe "Billing" room showcasing how to exploit a critical vulnerability to gain root access. We start with an initial scan revealing MagnusBilling running on port [--]. A quick search highlights CVE-2023-30258 an unauthenticated Remote Command Execution (RCE) vulnerability providing a direct path to a foothold. ๐Ÿ’ฐ We demonstrate two methods for exploiting CVE-2023-30258: * Metasploit Module: We'll"
YouTube Link 2025-03-09T01:50Z [----] followers, [----] engagements

"Intranet - TryHackMe - FLAG [--] - Zap ffuf burp Welcome to the intranet Flag [--] using Zap proxy ffuf and Burp suite"
YouTube Link 2023-06-20T11:44Z [----] followers, [---] engagements

"๐ŸŽฏ โœ… TryHackMe Custom Tooling using Burp Custom Burp Suite Extension (RSA Encrypt/Decrypt) โœ… ๐ŸŽฏ Creating custom tooling for application testing using Burp Plugins. โœ… In this TryHackMe walkthrough we tackle the "Custom Tooling using Burp" room Learn how to analyze web applications with custom encryption and build your own Burp Suite extension from scratch to handle it. ๐Ÿ•ตโ™‚ Room Focus: Custom Tooling using Burp Platform: TryHackMe ๐Ÿ“Œ What you'll learn in this video:๐Ÿ“Œ Understanding the challenge: End-to-end encryption in HTTP requests/responses. โœ” Identifying flaws in custom encryption schemes"
YouTube Link 2025-06-01T13:43Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task-20 Echoed Streams TryHackMe: Industrial Intrusion CTF AES-GCM Nonce Reuse Attack ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion How ONE Cryptographic Mistake Breaks Everything Nonce Reuse Attack Tutorial ๐Ÿ˜ธScenario:๐Ÿ˜ธ Three months after the Virelia Water Control Facility was breached OT traffic is finally back onlinesupposedly fully remediated. During a routine audit Black Echos red team intercepted two backtoback telemetry packets between a pump controller and the SCADA server. Curiously both packets were encrypted under AESGCM using the same 16-byte nonce (number"
YouTube Link 2025-06-30T10:38Z [----] followers, [---] engagements

"Confluence CVE-2023-22515 - TryHackMe - Exploit CVE-2023-22515 to get admin access to Confluence Server and Data Center editions. On October 4th [----] Atlassian released a security advisory regarding CVE-2023-22515 a broken access control vulnerability with an assigned CVSS score of [----]. The vulnerability was introduced in version 8.0.0 of Confluence Server and Data Center editions and is present in versions 8.3.3 8.4.3 8.5.2. https://tryhackme.com/room/confluence202322515 #tryhackme"
YouTube Link 2023-10-19T05:48Z [----] followers, [----] engagements

"๐Ÿ˜ธ๐Ÿปโ„๐ŸปAPT28 Attack Simulation: TryHackMe Incident Response Challenge APT28 in the Snare๐Ÿ˜ธ๐Ÿปโ„๐Ÿป Hunting APT28 (Fancy Bear) - TryHackMe Walkthrough & Forensic Investigation ๐Ÿ” TryHackMe "APT28 in the Snare" Full Walkthrough & Forensic Investigation In this hands-on TryHackMe walkthrough we investigate APT28 (Fancy Bear) a notorious Russian cyber-espionage group in a realistic incident response scenario. You'll learn how to: โœ… Detect initial access & execution โœ… Uncover persistence mechanisms (how APT28 stays hidden) โœ… Analyze privilege escalation & data exfiltration โœ… Use Eric Zimmermans tools"
YouTube Link 2025-05-25T10:49Z [----] followers, [---] engagements

"TryHackMe Subdomain Enumeration - Full Walkthrough [----] ๐Ÿ Learn the various ways of discovering subdomains to expand your attack surface of a target. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/subdomainenumeration ๐ŸšฉRoom Tasks:๐Ÿšฉ ๐Ÿƒ 00:00 Task 1: Brief - What is a subdomain enumeration method beginning with B - What is a subdomain enumeration method beginning with O - What is a subdomain enumeration method beginning with V ๐Ÿƒ 02:45 Task 2: OSINT - SSL/TLS Certificates ๐Ÿƒ 04:25 Task 3: OSINT - Search Engines - What domain was logged on crt.sh at 2020-12-26 ๐Ÿƒ 06:00 Task 4: DNS Bruteforce -"
YouTube Link 2025-10-05T06:05Z [----] followers, [--] engagements

"๐Ÿš€ TryHackMe: Directory Walkthrough Kerberos ASREP Roast Hashcat & WinRM Decryption Walkthrough ๐Ÿš€ Room Link: https://tryhackme.com/room/directorydfirroom ๐ŸšจTools Used: ๐Ÿ“ Script used in this video decrypt WinRM traffic: https://github.com/djalilayed/tryhackme/blob/main/directory/decrypt_winrm.py ๐Ÿ“ Command used in this video: https://github.com/djalilayed/tryhackme/tree/main/directory ๐Ÿ˜ธIn this complete step-by-step walkthrough of the TryHackMe room "Directory" we dive deep into network forensics and Active Directory attacks to go from a packet capture to the final flag. This video is"
YouTube Link 2025-07-21T06:38Z [----] followers, [---] engagements

"๐Ÿ“Œ๐Ÿ’ฅ๐Ÿ“Œ TryHackMe Heist Smart Contract Hacked ๐Ÿ”“ Full Walkthrough (Hackfinity CTF) ๐Ÿ“Œ๐Ÿ’ฅ๐Ÿ“Œ TryHackMe: Heist - Smart Contract changeOwnership & withdraw Exploit From the Hackfinity Battle CTF event. Welcome ethical hackers ๐Ÿ•ตโ™‚ In this video we're diving deep into the "Heist" room from TryHackMe originally featured in the Hackfinity Battle CTF event. The mission: A critical weakness has been found in Cipher's Smart Contract. If exploited we can drain its entire ETH treasury This isn't just about the loot; successfully emptying the contract will cut off funding to the notorious Phantom Node Botnet"
YouTube Link 2025-05-25T15:45Z [----] followers, [--] engagements

"TryHackMe Intro to SSRF Full Walkthrough [----] Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities allowing you to access internal server resources. In this room you'll learn what an SSRF is what kind of impact they can have you'll view some example SSRF attacks how you can discover SSRF vulnerabilities how to circumvent input rules and then we have a practice for you against with to try your newfound skills. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/ssrfqi This room part of TryHackMe Jr Penetration Tester path. ๐Ÿ“Œ What is an SSRF ๐Ÿ“Œ SSRF Examples ๐Ÿ“Œ Finding an SSRF ๐Ÿ“Œ"
YouTube Link 2025-09-11T11:45Z [----] followers, [--] engagements

"๐Ÿ‘‘ ๐Ÿ‘‘ Server-side Template Injection TryHackMe A Deep Dive into Exploiting Smarty Pug Jinja2 ๐Ÿ‘‘ ๐Ÿ‘‘ SSTI Overview ๐Ÿ‘‘ Template Engines ๐Ÿ‘‘ PHP - Smarty ๐Ÿ‘‘ NodeJS - Pug ๐Ÿ‘‘ Python - Jinja2 ๐Ÿ‘‘ Automating the Exploitation ๐Ÿ‘‘ Extra-Mile Challenge (Form Tools 3.1.1 CVE-2024-22722) ๐Ÿ‘‘ Mitigation ๐Ÿ‘‘ code / shell used on the room: https://github.com/djalilayed/tryhackme/blob/main/Server-side-Template-Injection/code-used.txt ๐Ÿ‘‘ Server Side Template Injection (SSTI) vulnerability in Form Tools 3.1.1 allows attackers to run arbitrary commands via the Group Name field under the add forms section of the"
YouTube Link 2024-06-19T07:32Z [----] followers, [----] engagements

"๐Ÿšจโœ… ๐Ÿฆˆ TryHackMe - Security Footage Walkthrough: Recovering a Scrolling Flag ๐Ÿฆˆ Security Footage (TryHackMe) - PCAP Forensics OCR & Flag Reconstruction Guide โœ…In this comprehensive walkthrough we tackle the "Security Footage" room on TryHackMe Join me as we dive into digital forensics to recover crucial footage and a hidden scrolling flag from a network capture (PCAP file). โœ… The hard drives are destroyed but the network never forgets We'll perform an end-to-end investigation covering: ๐Ÿ› โœ… Room Link: https://tryhackme.com/room/securityfootage ๐Ÿ” Network Forensics Fundamentals: - Analyzing"
YouTube Link 2025-05-11T05:00Z [----] followers, [---] engagements

"๐Ÿ”“โœ…๐Ÿ” Crypto Failures Crypt Salt A brute force attack TryHackMe CTF ๐Ÿ” ๐Ÿ”“๐Ÿ”“Implementing your own military-grade encryption is usually not the best idea. ๐Ÿ”“ First exploit the encryption scheme in the simplest possible way then find the encryption key. Room Link: https://tryhackme.com/room/cryptofailures ๐Ÿ—๐Ÿ”’ Scripts Used:๐Ÿ—๐Ÿ”’ ๐Ÿ“Œ Find web Flag๐Ÿ“Œ: https://github.com/djalilayed/tryhackme/blob/main/Crypto%20Failures/admin_flag.py ๐Ÿ“Œ Simulation [--] steps for the key ๐Ÿ“Œ https://github.com/djalilayed/tryhackme/blob/main/Crypto%20Failures/find_key_anim_10.php ๐Ÿ“Œ Get Encryption Key:๐Ÿ“Œ"
YouTube Link 2025-03-03T19:42Z [----] followers, [---] engagements

"โ˜€๐ŸŒ TryHackMe Serverless Walkthrough AWS SSRF & Role Escalation to Hijack Cloud Infrastructure โ˜€ Welcome to the Hackfinity Battle CTF๐Ÿš€ Infinity Shell CTF: Decoding Base64 & Tracing the Hacker (TryHackMe) ๐Ÿ“ŒIn this detailed walkthrough of TryHackMe's 'Serverless' room I demonstrate how to exploit AWS credentials and leverage vulnerabilities like SSRF LFI and role escalation to take control of a cloud-based red team infrastructure. Follow along as I uncover hidden flags from the DarkMatter gang's contractor ShadowFang and show you step-by-step how to access leaked information and overcome AWS"
YouTube Link 2025-03-27T12:35Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿค–๐Ÿ˜ธ๐Ÿค– ContAInment TryHackMe Room: Ransomware Investigation Walkthrough ๐Ÿšจ๐Ÿค–๐Ÿค– ๐Ÿ˜ธCan you help contain the ransomware threat with the help of AI๐Ÿ˜ธ ๐Ÿ“Œ๐Ÿ“ŒJoin me as we dive into the ContAInment TryHackMe room a thrilling ransomware investigation challenge In this walkthrough well step into the role of a Security Analyst at West Tech tasked with investigating a ransomware attack on senior researcher Oliver Deers workstation. Learn how to identify the attacker's entry point trace their actions recover stolen data and neutralize the threat using both manual techniques and an AI-powered IR"
YouTube Link 2025-07-10T08:07Z [----] followers, [---] engagements

"๐ŸŽฏ ๐Ÿ” Task [--] Orcam TryHackMe Industrial Intrusion CTF Walkthrough Malicious Macro Analysis ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐Ÿ˜ธScenario:๐Ÿ˜ธ You get an email with attachment Microsoft docm file. with Macro enable. you need to analyses the VBA code inside the macro to get the flag. In this step-by-step walkthrough we tackle the malicious document challenge from the TryHackMe Industrial Intrusion room. We'll go from receiving a suspicious email to fully reverse-engineering the hidden VBA macro to find the flag. This guide is perfect for anyone studying for"
YouTube Link 2025-06-30T16:58Z [----] followers, [---] engagements

"๐Ÿ˜ธ๐Ÿšจ TryHackMe Stolen Mount NFS From Wireshark PCAP to QR Code Flag ๐Ÿšจ๐Ÿšจ Analyse network traffic related to an unauthenticated file share access attempt focusing on potential signs of data exfiltration. โžก Room Link: https://tryhackme.com/room/hfb1stolenmount ๐Ÿ˜ธScenario:๐Ÿ˜ธ An intruder has infiltrated our network and targeted the NFS server where the backup files are stored. A classified secret was accessed and stolen. The only trace left behind is a packet capture (PCAP) file recorded during the incident. Your mission should you accept it is to discover the contents of the stolen data. ๐Ÿšฉ๐ŸšฉIn"
YouTube Link 2025-07-13T05:45Z [----] followers, [---] engagements

"Vulnerability Scanner Overview TryHackMe Cyber Security [---] SAL1 Learn about vulnerability scanners and how they work in a practical scenario. ๐Ÿชซ What Are Vulnerabilities ๐Ÿชซ Vulnerability Scanning ๐Ÿชซ Tools for Vulnerability Scanning ๐Ÿชซ CVE & CVSS ๐Ÿชซ OpenVAS ๐Ÿชซ Practical Exercise https://tryhackme.com/r/room/vulnerabilityscanneroverview these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #THMCyberSecurity101 #CyberSecurity101 #CyberSecurity #TryHackMe #VulnerabilityScanner #HackingTutorial #InfoSec #CyberTraining"
YouTube Link 2024-10-28T07:36Z [----] followers, [----] engagements

"๐ŸŽฏ๐Ÿ”” Active Directory Enumeration for Beginners TryHackMe AD: Basic Enumeration Walkthrough PT1 ๐Ÿท Learn how to enumerate an Active Directory network and get initial access. ๐Ÿ”ด Learn how to enumerate an Active Directory (AD) network and gain initial access in this step-by-step TryHackMe walkthrough Active Directory enumeration is a critical skill for penetration testers and ethical hackers. In this video well cover: โœ…Mapping Out the Network (fping nmap) Host Discovery Port Scanning โœ…Network Enumeration With SMB (nmap smbmap.py) Discovering Services Listing SMB Shares Accessing SMB Shares"
YouTube Link 2025-05-26T06:14Z [----] followers, [---] engagements

"๐Ÿ“Œ Dark Encryptor Hackfinity Battle Encore Command Injection Welcome to the Hackfinity Battle CTF In this room you learn how to exploit Command Injection ๐Ÿ“Œ๐Ÿ“Room Scenario:๐Ÿ“๐Ÿ“Œ Void managed to hack into DarkMatter's internal network. I don't think they use it much but we found this encryption tool hosted on a server. Let's see if we can find anything interesting lying around. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any"
YouTube Link 2025-03-24T18:45Z [----] followers, [---] engagements

"๐Ÿ”ด Dark Encryptor [--] Hackfinity Battle Encore Command Injection ๐Ÿ”ด Welcome to the Hackfinity Battle CTF In this room you learn how to exploit Command Injection similar to Dark Encryptor [--] ๐Ÿ”ฅRoom Scenario: ๐Ÿ”ฅ After pivoting through their internal network we have found yet another encryption tool. Can you hack into the server and extract the secret data Our intel tells us that the app is using the gpg tool. ๐Ÿ“ŒRoom Link๐Ÿ“Œ: https://tryhackme.com/room/HackfinityBattleEncore ๐Ÿ‘ Like Subscribe and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need"
YouTube Link 2025-03-25T08:19Z [----] followers, [---] engagements

"๐Ÿšจ๐Ÿ˜ธ Event Horizon TryHackMe Decrypt Covenant C2 traffic Wireshark ๐Ÿšจ๐Ÿ˜ธ ๐Ÿงธ๐Ÿงธ Unearth the secrets beyond the Event Horizon. ๐Ÿ–‡๐Ÿ–‡ Room Link: https://tryhackme.com/room/eventhorizonroom ๐Ÿปโ„ Room Scenario:๐Ÿปโ„ ๐ŸšฉJoin Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders they need you to utilize all your abilities to find the secrets that were taken when they crossed over to the other side. ๐Ÿ๐ŸAttacker was able to brute force ESMTP email sent phishing email to local user as Powershell script to calculate mass of the black hole but hidden at"
YouTube Link 2025-08-10T12:00Z [----] followers, [---] engagements

"Getting Started with Nmap: The Basics Discover Hosts and Open Ports in Cyber Security [---] SAL1 ๐Ÿ”€ Learn how to use Nmap to discover live hosts find open ports and detect service versions. ๐Ÿ”€ Host Discovery: Who Is Online ๐Ÿ”€ Port Scanning: Who Is Listening ๐Ÿ”€ Version Detection: Extract More Information ๐Ÿ”€ Version Detection: Extract More Information ๐Ÿ”€ Output: Controlling What You See ๐Ÿ”€ Conclusion and Summary https://tryhackme.com/r/room/nmap these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #CyberSecurity101 #NmapBasics #PortScanning"
YouTube Link 2024-10-24T14:14Z [----] followers, [---] engagements

"๐Ÿ›ก๐Ÿšจ๐Ÿšจ Bypass Really Simple Security CVE-2024-10924 TryHackMe ๐Ÿ›ก ๐Ÿ›ก Learn how to exploit a WordPress website using CVE-2024-10924 and understand various mitigation techniques.๐Ÿšจ ๐Ÿ›ก WordPress is one of the most popular open-source Content Management Systems (CMS) and it is widely used to build websites ranging from blogs to e-commerce platforms. In November [----] a critical vulnerability was discovered in the Really Simple Security plugin a widely adopted security plugin used by millions of websites. The vulnerability allowed attackers to bypass authentication and gain unauthorised access to"
YouTube Link 2025-02-05T09:12Z [----] followers, [----] engagements

"๐ŸŒŸ๐Ÿ‘ฉ๐Ÿผ๐Ÿ’ป Hack Back: Binary analysis Reverse Shell Smart Contract TryHackMe ๐Ÿ‘ฉ๐Ÿผ๐Ÿ’ป๐ŸŒŸ ๐ŸŒŸCan you get to the bottom of what's wrong with the machine๐ŸŒŸ ๐ŸŒŸYou have just been handed a machine by a disgruntled colleague. Pulling hairs out he explains that of late this machine has been very slow and crashed multiple times. They said the machine is relatively new and not nearly at an age where its performance should suffer. They've asked if you can look at the machine and determine what's causing this behavior. Can you use your cyber sleuthing skills and know how to get to the bottom of the machine's"
YouTube Link 2024-11-11T05:50Z [----] followers, [---] engagements

"TryHackMe Invite Only Full Walkthrough [----] - Hijacked Discord Invites - Malware Delivery ๐Ÿ”ฅ๐Ÿ”ฅ Extract insight from a set of flagged artefacts and distil the information into usable threat intelligence. ๐Ÿ”—๐Ÿ”—๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/invite-only โšกโšก Scenario:โšกโšก You are an SOC analyst on the SOC team at Managed Server Provider TrySecureMe. Today you are supporting an L3 analyst in investigating flagged IPs hashes URLs or domains as part of IR activities. One of the L1 analysts flagged two suspicious findings early in the morning and escalated them. Your task is to analyse these"
YouTube Link 2025-09-14T07:18Z [----] followers, [---] engagements

"TryHackMe Walking An Application - Full Walkthrough [----] ๐Ÿฑ๐Ÿฑ Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser no tools or scripts. ๐ŸŽ๐ŸŽ Room Link: https://tryhackme.com/room/walkinganapplication ๐Ÿ“๐Ÿ“ Room Tasks ๐Ÿ“๐Ÿ“ 00:00 โœ… Task 1: Walking An Application 01:13 โœ… Task 2: Exploring The Website 03:06 โœ… Task 3: Viewing The Page Source - What is the flag from the HTML comment - What is the flag from the secret link - What is the directory listing flag - What is the framework flag 13:50 โœ… Task 4: Developer Tools -"
YouTube Link 2025-10-20T10:37Z [----] followers, [--] engagements

"Publisher: Exploiting SPIP with CVE-2023-27372 for RCE and Beyond TryHackMe CTF walk through Test your enumeration skills on this boot-to-root machine. CVE-2023-27372 / SPIP publishing system ๐Ÿท room link: https://tryhackme.com/r/room/publisher The "Publisher" CTF machine is a simulated environment hosting some services. Through a series of enumeration techniques including directory fuzzing and version identification a vulnerability is discovered allowing for Remote Code Execution (RCE). Attempts to escalate privileges using a custom binary are hindered by restricted access to critical system"
YouTube Link 2024-06-29T13:22Z [----] followers, [----] engagements

"TryHackMe FAT32 Analysis Examine the FAT32 filesystem from a forensic point of view Examine the FAT32 filesystem from a forensic point of view โœ… Room Link โœ…: https://tryhackme.com/room/fat32analysis โœ… Introduction โœ… โšก A filesystem tracks how and where files are stored on an Operating System. It provides a translation between the files locations on the OS and their locations on physical storage. A filesystem also tracks file-related changes and options such as file deletion file access file size and more. โšก Filesystems are an essential component in forensics. Threat actors often abuse it in"
YouTube Link 2025-02-09T16:43Z [----] followers, [----] engagements

"TryHackMe Padelify - Full Walkthrough [----] - XSS - WAF ๐Ÿˆ Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. ๐Ÿฆฎ ๐Ÿ Room Link: https://tryhackme.com/room/padelify ๐Ÿง Youve signed up for the Padel Championship but your rival keeps climbing the leaderboard. The admin panel controls match approvals and registrations. Can you crack the admin and rewrite the draw before the whistle ๐Ÿ Tasks ๐Ÿ ๐Ÿˆ What is the flag value after logging in as a moderator ๐Ÿˆ What is the flag value after logging in as admin โš  Educational Purpose Only This content is for"
YouTube Link 2025-11-24T03:35Z [----] followers, [---] engagements

"TryHackMe: Industrial Intrusion CTF (Breach Task) Node-RED ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/industrial-intrusion ๐ŸŽฏ Get ready for the Industrial Intrusion CTF In this video we tackle the pre-task challenge "Breach" on TryHackMe. Our mission is to find a way to open the main gate by bypassing the badge authentication system. ๐ŸŽฏ Join us as we dig into the control infrastructure exploring open ports and uncovering a critical weakness in the system's HMI (Human-Machine Interface). ๐ŸŽฏ This is the perfect warm-up for the main event. If you want to see how to exploit real-world Industrial"
YouTube Link 2025-06-26T06:18Z [----] followers, [----] engagements

"Decrypt NTLM traffic - Wireshark - Decrypting SMB3 Traffic -TryHackme Block - ๐Ÿฆˆ This new way to solve the Block room on TryHackMe. Showcasing how to decrypt smb traffic if you know user password using Wireshark NTLMSSP support Also if you just have NT hash you can decrypt NTLM encrypted traffic (smb3 encrypted traffic) by providing the hash in a keytab file. ๐Ÿฆˆ๐ŸฆˆScript used to generate keytab file: https://github.com/dirkjanm/forest-trust-tools/blob/master/keytab.py ๐Ÿฆˆ๐ŸฆˆArticles used: ๐Ÿ  https://wiki.wireshark.org/NTLMSSP ๐Ÿ "
YouTube Link 2024-08-13T06:43Z [----] followers, [---] engagements

"TryHackMe JWT Security - Full Walkthrough TryHackMe Walkthrough on Token-Based Authentication Master JWTs & Token Security TryHackMe Room Guide ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/r/room/jwtsecurity In this room you will learn about JSON Web Tokens (JWTs) and the security associated with them. With the rise of APIs token-based authentication has become a lot more popular and of these JWTs remain one of the most popular implementations. However with JWTs ensuring the implementation is done securely is incredibly important. Insecure implementations can lead to serious vulnerabilities with"
YouTube Link 2024-09-20T06:26Z [----] followers, 13.5K engagements

"๐Ÿง โœจ๐Ÿ“Œ EXT Analysis forensic basics of the EXT file system TryHackMe ๐Ÿง ๐Ÿง๐ŸงDiscover the forensic basics of the EXT file system.๐Ÿง๐Ÿง https://tryhackme.com/room/extanalysis ๐ŸงFile system analysis is a fundamental skill in digital forensics allowing investigators to extract and interpret data stored on storage devices. EXT4 the default file system for many Linux distributions organizes data into structures like inodes directories and blocks each carrying critical information about files directories and their history.๐Ÿง ๐ŸงThis room focuses on analyzing the EXT4 file system to gather evidence"
YouTube Link 2025-02-20T13:40Z [----] followers, [---] engagements

"TryHackMe Contrabando Full Walkthrough [----] LFI SSTI Request Smuggling ๐Ÿง TryHackMe room link: https://tryhackme.com/room/contrabando ๐Ÿง๐Ÿ Never tell me the odds.๐Ÿ๐Ÿง Our company was excited to release our new product but a recent attack has forced us to go down for maintenance. They have asked you to conduct a vulnerability assessment to help identify how the attack occurred. Are you up for it In this room you start by exploiting CVE-2023-25690 (HTTP request splitting with mod_rewrite and mod_proxy) and get your first initial reverse shell inside the machine you scan local networks to find a"
YouTube Link 2025-08-18T14:32Z [----] followers, [----] engagements

"IDORable Bistro - SANS Holiday Hack Challenge [----] ๐ŸŽฏ Josh has a tasty IDOR treat for youstop by Sasabune for a bite of vulnerability. What is the name of the gnome ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Hints: ๐Ÿšฉ๐Ÿšฉ โœ… Sometimes.developers put in a lot of effort to anonymyze information by using randomly generated identifiers.but.there are also times where the "real" ID is used in a separate Network request. โœ… I had tried to scan one of the QR codes and it took me to somebody's meal receipt I am afraid somebody could look up anyone's meal if they"
YouTube Link 2025-11-30T07:11Z [----] followers, [--] engagements

"TryHackMe AI in Security - old sAInt nick - Advent of Cyber [----] ๐ŸŸ Unleash the power of AI by exploring it's uses within cyber security. ๐Ÿฆฎ Day [--] of Advent of Cyber [----] ๐Ÿ“ ๐Ÿง Link: https://tryhackme.com/room/AIforcyber-aoc2025-y9wWQ1zRgB ๐Ÿฆฎ The lights glimmer and servers hum blissfully at The Best Festival Company (TBFC) melting the snow surrounding the data centre. TBFC has continued its pursuit of AI excellence. After the past two years they realise that Van Chatty their in-house chatbot wasnt quite meeting their standards. ๐Ÿฆฎ Unfortunately for the elves at TBFC they are also not immune"
YouTube Link 2025-12-04T16:59Z [----] followers, [---] engagements

"Neighborhood Watch Bypass - SANS Holiday Hack Challenge [----] - Linux PATH hijacking Assist Kyle at the old data center with a fire alarm that just won't chill. ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Room Scenario: ๐Ÿšฉ๐Ÿšฉ ๐Ÿ  chiuser @ Dosis Neighborhood ๐Ÿ” $ ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ DOSIS NEIGHBORHOOD FIRE ALARM SYSTEM - LOCKOUT MODE ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ๐Ÿšจ๐Ÿ”ฅ ๐Ÿšจ EMERGENCY ALERT: Fire alarm system admin access has been compromised ๐Ÿšจ โœ… The fire safety systems are experiencing interference and admin privileges have been mysteriously"
YouTube Link 2025-12-18T05:39Z [----] followers, [---] engagements

"Carrotbane of My Existence Side Quest Access key - Full Walkthrough [----] ๐ŸŽฏ๐ŸŽฏ Step by step to get the key to access side quest room Carrotbane of My Existence https://tryhackme.com/room/sq3-aoc2025-bk3vvbcgiT ๐ŸŽฏ๐ŸŽฏ Key is on room CyberChef - Hoperation Save McSkidy - Day [--] https://tryhackme.com/room/encoding-decoding-aoc2025-s1a4z7x0c3 ๐ŸŽ Scenario: ๐ŸŽ Hopper managed to use CyberChef to scramble the easter egg key image. He used this very recipe to do it. The scrambled version of the egg can be downloaded from:"
YouTube Link 2025-12-31T23:45Z [----] followers, [--] engagements

"Quantgnome Leap - SANS Holiday Hack Challenge [----] Charlie in the hotel has quantum gnome mysteries waiting to be solved. What is the flag that you find ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Room Scenario: ๐Ÿšฉ๐Ÿšฉ +---------------------------------+ "If we knew the unknown the unknown wouldn't be unknown." Quantum Leap (TV series) +---------------------------------+ You observed me the Gnome. .and I observed you back. Did you see me Am I here or not Both Neither Am I a figment of your imagination Nay I am the QuantGnome. Welcome to my challenge ***"
YouTube Link 2025-12-08T13:26Z [----] followers, [---] engagements

"TryHackMe Breaking Crypto the Simple Way - Common Cryptographic Mistakes - Bit Flipping Attacks ๐Ÿ”“๐Ÿ”“ Can You Break Crypto This Easily TryHackMe - Exploiting Simple Crypto Flaws - Exploiting common cryptographic mistakes. ๐Ÿ”“๐Ÿ”“ Learn how to exploit common cryptographic mistakes in this TryHackMe walkthrough We'll cover brute-forcing keys breaking hashes finding exposed keys and even bit flipping attacks. Perfect for beginners and anyone looking to understand real-world crypto vulnerabilities. Let's dive in ๐Ÿ”“Brute-forcing Keys (RSA) ๐Ÿ”“Breaking Hashes (HMAC hashcat) ๐Ÿ”“Exposed Keys (Encryption"
YouTube Link 2025-04-09T06:51Z [----] followers, [----] engagements

"Rogue Gnome Identity Provider - JWKS spoofing - SANS Holiday Hack Challenge [----] Hike over to Paul in the park for a gnomey authentication puzzle adventure. What malicious firmware image are the gnomes downloading This room is about JWT authentication bypass via jku header injection (JWKS spoofing) ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Scripts Used in this video ๐Ÿšฉ๐Ÿšฉ Python script to generate jwks.json: https://github.com/djalilayed/SANS-Holiday-Hack-Challenge-2025/blob/main/Rogue_Gnome_Identity_Provider/jwks.py Commands Used:"
YouTube Link 2025-12-07T09:04Z [----] followers, [---] engagements

"TryHackMe Farewell - Full Walkthrough [----] ๐ŸŽฏ Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. ๐Ÿ”—๐Ÿ”— Room Link: https://tryhackme.com/room/farewell ๐ŸŽฏ The farewell server will be decommissioned in less than [--] hours. Everyone is asked to leave one last message but the admin panel holds all submissions. Can you sneak into the admin area and read every farewell message before the lights go out ๐Ÿฏ Commands / payloads used on the video: https://github.com/djalilayed/tryhackme/tree/main/Farewell ๐Ÿฏ Python script used on the video:"
YouTube Link 2025-11-17T16:15Z [----] followers, [---] engagements

"Dosis Network Down - SANS Holiday Hack Challenge [----] ๐ŸŽฏ Drop by JJ's 24-7 for a network rescue and help restore the holiday cheer. What is the WiFi password found in the router's config ๐Ÿท๐Ÿท Challenge Link: https://www.sans.org/cyber-ranges/holiday-hack-challenge ๐Ÿšฉ๐Ÿšฉ Hints: ๐Ÿšฉ๐Ÿšฉ โœ… I can't believe nobody created a backup account on our main router.the only thing I can think of is to check the version number of the router to see if there are any.ways around it. โœ… You know.if my memory serves me correctly.there was a lot of fuss going on about a UCI (I forgot the exact term.) for that router."
YouTube Link 2025-11-29T14:26Z [----] followers, [---] engagements

"Rabbit Store SSTI Rabbitmq SSRF API web application testing TryHackMe ๐Ÿฅ•๐Ÿฅ• New room Rabbit Store from @RealTryHackMe : Demonstrate your web application testing skills and the basics of Linux to escalate your privileges. ๐Ÿฅ•๐Ÿฅ• This interesting room you start with JWT token exploit (Mass assignment vulnerabilities) for entry point SSRF then SSTI exploit for root you work with Rabbitmq (Password Hashes) ๐Ÿฅ•๐Ÿฅ• Room Link: https://tryhackme.com/room/rabbitstore ๐Ÿฅ•๐Ÿฅ• API testing (Mass assignment vulnerabilities) https://portswigger.net/web-security/api-testing ๐Ÿฅ•๐Ÿฅ• SSTI payload used in this room:"
YouTube Link 2025-02-25T15:04Z [----] followers, [----] engagements

"TryHackMe Elastic Stack: The Basics Full Walkthrough [----] Understand how SOC analysts use the Elastic Stack (ELK) for log investigations. ๐Ÿ“๐Ÿ“ Room Link: https://tryhackme.com/room/investigatingwithelk101 ๐Ÿ˜ธ Learning Objectives ๐Ÿ˜ธ This room has the following learning objectives: ๐Ÿš€ Understand the components of ELK and their use in SOC ๐Ÿš€ Explore the different features of ELK ๐Ÿš€ Learn to search and filter data in ELK ๐Ÿš€ Investigate VPN logs to identify anomalies ๐Ÿš€ Familiarize with creating visualizations and dashboards in ELK ๐Ÿ˜ธ Timestamp: ๐Ÿ˜ธ 00:00 Task 1: Introduction 01:27 Task 2: Elastic"
YouTube Link 2026-01-20T09:21Z [----] followers, [---] engagements

"Monday Monitor on TryHackMe Swiftspend's Cybersecurity Challenge TryHackMe SOC Level [--] SAL1 ๐ŸชŸ๐ŸชŸ Ready to test Swiftspend's endpoint monitoring ๐ŸชŸ๐ŸชŸ Scenario Swiftspend Finance the coolest fintech company in town is on a mission to level up its cyber security game to keep those digital adversaries at bay and ensure their customers stay safe and sound. Led by the tech-savvy Senior Security Engineer John Sterling Swiftspend's latest project is about beefing up their endpoint monitoring using Wazuh and Sysmon. They've been running some tests to see how well their cyber guardians can sniff out"
YouTube Link 2024-07-30T13:11Z [----] followers, [----] engagements

"TryHackMe Passive Reconnaissance - Full Walkthrough [----] Learn about the essential tools for passive reconnaissance such as whois nslookup and dig. ๐Ÿท๐Ÿท Room Link: https://tryhackme.com/room/passiverecon ๐ŸŽฏ Room Tasks: ๐ŸŽฏ ๐Ÿ“Œ Task 1: Introduction ๐Ÿ“Œ Task 2: Passive Versus Active Recon ๐Ÿ“Œ Task 3: Whois ๐Ÿ“Œ Task 4: nslookup and dig ๐Ÿ“Œ Task 5: DNSDumpster ๐Ÿ“Œ Task 6: Shodan.io ๐Ÿ“Œ Task 7: Summary ๐Ÿฆฎ Websites used on the video: ๐Ÿฆฎ Shodan: https://www.shodan.io/ Nslookup: https://www.nslookup.io/ Mxtoolbox: https://mxtoolbox.com/ DNSDumpster: https://dnsdumpster.com/ โš  Educational Purpose Only This"
YouTube Link 2026-01-02T10:33Z [----] followers, [---] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@djalilayed
/creator/youtube::djalilayed