SOC Fundamentals
Learn the fundamentals of a Security Operations Center (SOC), including the roles, responsibilities, and tools used by SOC analysts. Based on the TryHackMe SOC Fundamentals room.
Learn the fundamentals of a Security Operations Center (SOC), including the roles, responsibilities, and tools used by SOC analysts. Based on the TryHackMe SOC Fundamentals room.
Learn about SQL injection vulnerabilities and how to exploit them using the powerful SQLMap tool. Based on the TryHackMe SQL Injection room.
Learn about file inclusion vulnerabilities in web applications, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. Understand how attackers exploit these fl...
Learn about common file upload vulnerabilities in web applications, how attackers exploit them to execute malicious code or bypass restrictions, and how to prevent such attacks. Based on the TryHac...
Learn about command injection vulnerabilities, how attackers exploit them to execute system commands through insecure applications, and strategies for prevention. Based on the TryHackMe Command Inj...
Learn the differences between reverse, bind, and web shells. Explore how shells work and how attackers use them to gain remote access. Based on the TryHackMe Shells Overview room.
Introduction to Gobuster, an offensive security tool used for enumeration.
Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials. From THM.
OWASP Top 10-2021 from TryHackMe
Burp Suite from TryHackMe