Sidharth · @tenocijam
2 followers · 13 posts · Server infosec.exchange
Sidharth · @tenocijam
2 followers · 12 posts · Server infosec.exchange

✅ Completed Day 6 of 2022 from @RealTryHackMe

Learnt about different ways to analyze an email

#adventofcyber #adventofcyber2022 #cybersecurity #hacking #infosec #tryhackme

Last updated 2 years ago

Sidharth · @tenocijam
2 followers · 11 posts · Server infosec.exchange

✅ Completed Day 5 of 2022 from @RealTryHackMe

Learnt about:
• Brute-Forcing
• Different remote access services: SSH, RDP, VNC
• Connecting to a VNC server

#adventofcyber #adventofcyber2022 #cybersecurity #hacking #infosec #tryhackme

Last updated 2 years ago

Sidharth · @tenocijam
1 followers · 10 posts · Server infosec.exchange

✅ Completed Day 4 of 2022 from @RealTryHackMe

Learnt about different Scanning techniques and tools:
• Network Scanning
• Port Scanning
• Vulnerability Scanning
• Nmap
• Nikto

#adventofcyber #adventofcyber2022 #cybersecurity #hacking #infosec #tryhackme

Last updated 2 years ago

techc0w 💻 🐮 · @techc0w
57 followers · 171 posts · Server techhub.social

I wasn't expecting to win anything from the event. I'm just happy that I got a certificate and the feeling of accomplishment in doing the tasks for 24 days straight.

Congrats to the winners!

#tryhackme #adventofcyber2022

Last updated 2 years ago

Ryan :donor:​ · @chmod777
270 followers · 391 posts · Server infosec.exchange
· @tactac
30 followers · 73 posts · Server infosec.exchange

Days 022 + 023 of

Tryhackme's Advent of Cyber

- [Day 19] Hardware Hacking
- [Day 20] Firmware Reverse Engineering
- [Day 21] Hacking IoT Devices
- [Day 22] Attack Surface Reduction
- [Day 23] Defence in Depth

Finished the last minute.

#100daysofhacking #adventofcyber2022

Last updated 2 years ago

Kristian Alexander · @LordxCat
2 followers · 25 posts · Server infosec.exchange

Niccesss. Just finally had some time to do the last handful of challenges of

Fingers crossed on maybe winning something, but I learnt so much anyway which is the real prize..

#adventofcyber2022

Last updated 2 years ago

Super excited to say I completed the @RealTryHackMe
I am extremely grateful for all of the hard work that was put into making this challenge fun and enjoyable for all.
I can't wait for next year and if you want to learn some You should definitely get involved in tryhackme.org and other sites like this.
My favorite out of all of them was the and but all of it was fun and I definitely learned a lot.

#adventofcyber2022 #redteaming #sigmarules #malwareanalysis

Last updated 2 years ago

Aleksey · @complexsystems
20 followers · 20 posts · Server infosec.exchange
defaultvlan :verified: · @defaultvlan
179 followers · 148 posts · Server infosec.exchange

Somehow I don’t like that this one site publishes a day 1-24 write-up for with all flags in plain text, when the challenge isn’t even over yet.

#adventofcyber2022

Last updated 2 years ago

· @tactac
30 followers · 72 posts · Server infosec.exchange

Day 021 of

Tryhackme's Advent of Cyber

- [Day 17] Secure Coding - Input Validation and Regex
- [Day 18] Sigma - Threat Detection

Final sprint in the .

#100daysofhacking #adventofcyber2022

Last updated 2 years ago

techc0w 💻 🐮 · @techc0w
56 followers · 165 posts · Server techhub.social

(12/24) and (12/25) of my journey:

Finally finished the event from and got my certificate. Also resumed my progress in the Web Fundamentals path. Finished up on File Inclusion and now diving into SSRF.

Happy Holidays and Merry Christmas to those who celebrate :)

#day29 #day30 #cybersecurity #adventofcyber2022 #tryhackme

Last updated 2 years ago

defaultvlan :verified: · @defaultvlan
176 followers · 145 posts · Server infosec.exchange

Finished by . Very broad range of topics. Was really good.

#adventofcyber2022 #tryhackme

Last updated 2 years ago

Busta · @Busta
14 followers · 56 posts · Server infosec.exchange

That's it, no more rooms of from
It's been a fun month. I explored some recommended rooms and I will continue to learn more in these rooms.
Now to just wait and see if I maybe won a prize.

#adventofcyber2022 #tryhackme

Last updated 2 years ago

CyberSecGuy · @CyberSecGuy
0 followers · 3 posts · Server infosec.exchange

Finished this up this morning. You still have until December 28th to work through this room to be entered into the raffle for the prize pool.

tryhackme.com/jrcastine/badges

#tryhackme #adventofcyber2022

Last updated 2 years ago

reimerex · @reimerex
4 followers · 18 posts · Server infosec.exchange

[ ] Day 4

In Day 4 Tasks, we learn on how to do

Scanning is procedure to identify living hosts, ports, and services running on specify target.

There are 2 types of scan based on their intrusiveness:
1.
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using . However, the information you can get are fairly limited.

2.
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.

Several techniques:
1.
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch through the weakness of enemy network.

2.
The scan that aimed to look for any open port that capable of sending and retrieving request/data.

3.
The scan that aimed to identify what kind of existed on the network that may threaten the system.

Tools to do scanning:
1.
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open , open , running , etc.

2.
Nikto is a open source that can be used to identify for . It allows to search a for their subdomains, outdated servers, messages, and many more.

#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug

Last updated 2 years ago

reimerex · @reimerex
4 followers · 17 posts · Server infosec.exchange

[ ] Day 3

Yes, I try to speedrun AdventOfCyber2022 in Christmas

Anyway... in Day 3 we learn about

OSINT (Open Source Intelligence) is gathering and analyzing gathered data from public spaces to conduct intelligence operation.

In Day 3 Task, there were several OSINT techniques being teach:

1. Google Dorking
As the name suggests, we gather public data using specialized search terms on Google Search to obtain data we want.

2. WHOIS Lookup
We can extract information on who create or registering the website using whois website (who.is/whois/websitename)

3. Robots.txt
By looking at robots.txt of a website we can see which index were allowed or not allowed to be accessed of a website URL

4. Breached Database Search
We can verify if an email has been compromised using publicly accessible checker. For example website (haveibeenpwned.com) made by @troyhunt

5. Searching Repos
We could search up public repos using github search functionality. The problem is, usually developers forgot that they set their repo as public and save some sensitive information such as passwords, access tokens, etc.

#adventofcyber2022 #osint #github

Last updated 2 years ago

CyberSecGuy · @CyberSecGuy
0 followers · 1 posts · Server infosec.exchange

Finished this up this morning. You still have until December 28th to work through this room to be entered into the raffle for the prize pool.

tryhackme.com/jrcastine/badges

#tryhackme #adventofcyber2022

Last updated 2 years ago

Geschafft!

#adventofcyber2022

Last updated 2 years ago