TryHackMe
-
Boogeyman 3:WALKTHROUGH
Due to the previous attacks of Boogeyman, Quick Logistics LLC hired a managed security service provider to handle its Security Operations Center.…
-
Boogeyman 2:WALKTHROUGH
After having a severe attack from the Boogeyman, Quick Logistics LLC improved its security defences. However, the Boogeyman returns with new and…
-
Boogeyman 1: WALKTHROUGH
Uncover the secrets of the new emerging threat, the Boogeyman. In this room, you will be tasked to analyse the Tactics, Techniques,…
-
Tempest: WALKTHROUGH
This room aims to introduce the process of analysing endpoint and network logs from a compromised asset. Given the artefacts, we will…
-
Phishing Prevention: WALKTHROUGH
There are various actions a defender can take to help protect the users from falling victim to a malicious email. Some examples…
-
Phishing Analysis Tools: WALKTHROUGH
Remember from Phishing Room 1; we covered how to manually sift through the email raw source code to extract information. In this room, we…
-
Secret Recipe: WALKTHROUGH
Storyline Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original…
-
Critical: WALKTHROUGH
Incident Scenario Our user “Hattori” has reported strange behavior on his computer and realized that some PDF files have been encrypted, including…