By Shamsher khna This is a Writeup of Tryhackme room “Intro to Python”

Task 3. Mathematical Operators

Question 1. What is the name of >

Answer: greater than

Question 2. What is the name of !=

Answer: not equal to

Question 3. 1 != 0 will this return true or false (T or F)


By Shamsher khna This is a Writeup of Tryhackme room “Intro to ISAC”

Introduction:-

Threat Intelligence, also known as TI and Cyber Threat Intelligence also known as, CTI, is used to provide information about the threat landscape specifically adversaries and their TTPs. …


By Shamsher khna This is a writeup of the TryHackMe room “John The Ripper” from the creator PoloMints

https://tryhackme.com/room/johntheripper0

Task 2: Setting up John the Ripper

Question: What is the most popular extended version of John the Ripper?

Answer: Jumbo John

Task 3: Wordlists

Question: What website was the rockyou.txt wordlist created from a breach on?

Answer: rockyou.com

Task 4: Cracking Basic Hashes

Tool we use…


By Shamsher khna This is a Writeup of Tryhackme room “MITRE”

TASK 1 & 2 are simple click and complete tasks

TASK 3

Question 1: Only blue teamers will use the ATT&CK Matrix? (Yay/Nay)

Nay

Question 2: What is the ID for this technique?

T1566

Question 3: Based on this…


By Shamsher khna This is a Writeup of Tryhackme room “Jack”

https://tryhackme.com/room/jack
https://tryhackme.com/room/jack

Setup

First, we will connect to the VPN. If you are not familiar with the process go through this room

Once we are connected we will deploy the machine (note that in the room description there is a request for…


By Shamsher khna This is a Writeup of Tryhackme room “Hardening Basics Part 1”

Machine Credential spooky:tryhackme


By Shamsher khna This is a Writeup of Tryhackme room “Hardening Basics Part 2”

https://tryhackme.com

spooky:tryhackme


By Shamsher khan

To learn and practice penetration testing against web application and network devices, vulnerable web applications and platforms are playing major role and provide all the possibilities of attacks.

Here we have list of all most every vulnerable systems and applications on the internet.

Vulnerable Web Applications


By Shamsher Khan, This is a Writeup of Tryhackme room “Linux Agency”

https://tryhackme.com/room/linuxagency

Welcome to Linux Agency. Agent 47, this is where you will need to go through several tests concerning linux fundamentals and privilege escalation techniques.

This room is proudly made by 0z09e and Xyan1d3

If you enjoy this room…


By Shamsher khna This is a Writeup of Tryhackme room “Physical Security Intro”

https://tryhackme.com/room/physicalsecurityintro

Room link: https://tryhackme.com/room/physicalsecurityintro

Task 1. Introduction

Learn the basics of physical security

A lot of times physical security is overlooked during red team engagements. …

Shamsher khan

Web Application Pen-tester || CTF Player || Security Analyst || Freelance Cyber Security Trainer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store