TryHackMe Challenges: Sustah Room Walkthrough
In this post, i would like to share walkthrough on Sustah Room. This room is been considered difficulty rated as MEDIUM machine Let’s Start! We need to deploy the machine for us…
Security Awareness for all user
In this post, i would like to share walkthrough on Sustah Room. This room is been considered difficulty rated as MEDIUM machine Let’s Start! We need to deploy the machine for us…
Nowadays, IT technical skills and knowledge are needed within the HealthCare industry especially hospitals, primary, pharmaceutical companies and so on. The changes happened due to pandemic-driven changes where staff are…
In this post, i would like to share walkthrough on Misguided Ghost Room. This room is been considered difficulty rated as HARD machine Let’s Start! We need to deploy the machine for…
In this post, i would like to share walkthrough on Chocolate Factory Room. This room is been considered difficulty rated as LOW machine Let’s Start! We need to deploy the…
I will share my experience on the Cloud Implementation’s Best Practice and doesn’t applied to any of my previous, current organisations. My options would be off for certain organisation and…
Recently, there is a news about attacker have compromised data that to COVID-19 vaccinations on the European Medicines Agency(EMA) which is connected to the internet. For those that never heard…
In this post, I would like to share my experience and walkthrough on Jeff Room. Overall, I have taken a few days just to complete this machine and it’s a…
Microsoft will be allowed by default to all Domain Controller to be in “Enforcement mode” in order to manage the CVE-2020-1472 which it will be implemented starting Feb 9 2021.…
I haven’t done any Walkthrough for a while. As a result, I will do a walkthrough on 0day room which we will learn a vulnerability such as ShellShock. Let’s study…
Mimecast is a company that issues a certificate to those people or organisation especially Microsoft’s 365 Outlook/Exchange admit that they been compromised by the sophisticated threat actors. The sophisticated threat…