Open in app

Sign In

Write

Sign In

0xStn
0xStn

38 Followers

Home

About

Sep 12

💻Cyber Security Engineering [TryHackMe]

In this blog, I will dive into this field to declare the Security Engineers, what they can do, and what is the best platform to introduce to this field and have the knowledge to be one of the lords in this field so…, let’s go How to Become a Security…

Tryhackme

9 min read

💻Cyber Security Engineering [TryHackMe]
💻Cyber Security Engineering [TryHackMe]
Tryhackme

9 min read


Aug 22

🐕‍🦺Autopsy notes

Autopsy is an open-source and powerful digital forensics platform. “Autopsy is the premier open-source forensics platform which is fast, easy to use, and capable of analysing all types of mobile devices and digital media. Its plug-in architecture enables extensibility from community-developed or custom-built modules. …

Autopsy

8 min read

🐕‍🦺Autopsy notes THM
🐕‍🦺Autopsy notes THM
Autopsy

8 min read


Aug 19

💻Linux Forensics [THM]

Learn about the common forensic artifacts found in the file system of Linux Operating System Task 1 — — — Introduction Linux is very common in servers that host different services for enterprises. In an Enterprise environment, the two most common entry points for an external attacker are either through public-facing servers or through endpoints used…

Cybersecurity

19 min read

💻Linux Forensics [THM]
💻Linux Forensics [THM]
Cybersecurity

19 min read


Aug 17

💻Windows Forensics 1 [THM]

introduction to Windows registry forensics 💻Task 1 >Computer forensics is an essential field of cyber security that involves gathering evidence of activities performed on computers. It is a part of the wider Digital Forensics field, which deals with forensic analysis of all types of digital devices, including recovering, examining, and analyzing data found in…

Cybersecurity

16 min read

💻Windows Forensics 1 [THM]
💻Windows Forensics 1 [THM]
Cybersecurity

16 min read


Jul 20

[THM] Warzone 2

You work as a Tier 1 Security Analyst L1 for a Managed Security Service Provider (MSSP). Again, you’re tasked with monitoring network alerts. An alert triggered: Misc activity, A Network Trojan Was Detected, and Potential Corporate Privacy Violation. The case was assigned to you. Inspect the PCAP and retrieve the…

Cybersecurity

5 min read

[THM] Warzone 2 — Write up
[THM] Warzone 2 — Write up
Cybersecurity

5 min read

0xStn

0xStn

38 Followers

LT - Cyber threat investigator

Following
  • Lennart Erikson

    Lennart Erikson

  • Jasper Alblas

    Jasper Alblas

  • Toumo

    Toumo

  • Microsoft Design

    Microsoft Design

  • Saqib Shabbir

    Saqib Shabbir

See all (8)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams