Open in app

Sign In

Write

Sign In

Pratik Dhavade
Pratik Dhavade

7 Followers

Home

About

Jul 17, 2022

Intro to Defensive Security — TryHackMe Walkthrough 2022

Introduction to Defensive Security Offensive security focuses on one thing: breaking into systems. Breaking into systems might be achieved through exploiting bugs, abusing insecure setups, and taking advantage of unenforced access control policies, among other things. Red teams and penetration testers specialize in offensive security. Defensive security is somewhat the…

Defensive Security

9 min read

Intro to Defensive Security — TryHackMe Walkthrough 2022
Intro to Defensive Security — TryHackMe Walkthrough 2022
Defensive Security

9 min read


Jun 14, 2022

Intro to Offensive Security — TrayHackMe Walkthrough 2022

Task 1: Hacking your first machine Your first hack Click the “Start Machine” button. Once loaded, you will have access to a machine you’ll use to hack a fake bank application called FakeBank. We will use a command-line application called “GoBuster” to brute-force FakeBank’s website to find hidden directories and…

Offensive Security

4 min read

Intro to Offensive Security — TrayHackMe Walkthrough 2022
Intro to Offensive Security — TrayHackMe Walkthrough 2022
Offensive Security

4 min read


May 17, 2022

History of Malware — TryHackMe Walkthrough 2022

“Malware” consists of two words combined; malicious and software. Typically, Malware is designed to cause damage to Computers or Networks, this may be on a very large scale or only on a local network (LAN). The Creeper Program: Concepts of Malicious Software have been around since 1949, and one of…

History Of Malware

14 min read

History of Malware — TryHackMe Walkthrough 2022
History of Malware — TryHackMe Walkthrough 2022
History Of Malware

14 min read


Published in

System Weakness

·Apr 8, 2022

Subdomain Enumeration — TryHackMe Walkthrough 2022

Task 1: Brief Subdomain enumeration is the process of finding valid subdomains for a domain, but why do we do this? We do this to expand our attack surface to try and discover more potential points of vulnerability. We will explore three different subdomain enumeration methods: Brute Force, OSINT (Open-Source…

Subdomains Enumeration

3 min read

Subdomain Enumeration — TryHackMe Walkthrough 2022
Subdomain Enumeration — TryHackMe Walkthrough 2022
Subdomains Enumeration

3 min read


Apr 6, 2022

Content Discovery — TryHackMe WalkThrough

Task 1: What Is Content Discovery? Content can be many things, a file, video, picture, backup, and a website feature. …

Tryhackme

9 min read

Content Discovery — TryHackMe WalkThrough
Content Discovery — TryHackMe WalkThrough
Tryhackme

9 min read


Jan 13, 2022

Blue — TryHackMe Walkthrough

Task 1 Recon How many ports are open with a port number under 1000?

Tryhackme

2 min read

Blue — TryHackMe Walkthrough
Blue — TryHackMe Walkthrough
Tryhackme

2 min read


Jan 11, 2022

Active Directory Basics — TryHackMe Walkthrough

Task 1 Introduction What is Active Directory? - Active Directory is a collection of machines and servers connected inside of domains, that are a collective part of a bigger forest of domains, that make up the Active Directory network. Active Directory contains many functioning bits and pieces, a majority of which we will…

Active Directory Basics

5 min read

Active Directory Basics — TryHackMe Walkthrough
Active Directory Basics — TryHackMe Walkthrough
Active Directory Basics

5 min read


Jan 10, 2022

Intro to Windows — TryHackMe Walkthrough

Task 1 A little history When was Windows announced? >> November 20 1985 Which is the latest version of Windows? >> Windows 11 Which is the latest version of Windows Server? >> Windows Server 2019 Task 2 Windows file system and permissions explained PerfLogs — Stores the system issues and other reports regarding performance Program Files and Program Files (x86) — Is the…

Intro To Windows

2 min read

Intro to Windows — TryHackMe Walkthrough
Intro to Windows — TryHackMe Walkthrough
Intro To Windows

2 min read


Jan 9, 2022

Encryption — Crypto 101 — TryHackMe Walkthrough

Task 2 Key terms Ciphertext — The result of encrypting a plaintext, encrypted data Cipher — A method of encrypting or decrypting data. Modern ciphers are cryptographic, but there are many non cryptographic ciphers like Caesar. Plaintext — Data before encryption, often text but not always. Could be a photograph or other file Encryption…

Encryption

4 min read

Encryption — Crypto 101 — TryHackMe Walkthrough
Encryption — Crypto 101 — TryHackMe Walkthrough
Encryption

4 min read


Jan 9, 2022

John The Ripper- TryHackMe Walkthrough

Task 2: Setting up John the Ripper What is the most popular extended version of John the Ripper? >> jumbo john Task 3: Wordlists What website was the rockyou.txt wordlist created from a breach on? >> rockyou.com Task 4 Cracking Basic Hashes What type of hash is hash1.txt? >> md5 What is the cracked value of hash1.txt?

John The Ripper

7 min read

John The Ripper- TryHackMe Walkthrough
John The Ripper- TryHackMe Walkthrough
John The Ripper

7 min read

Pratik Dhavade

Pratik Dhavade

7 Followers

💻 Cybersecurity Enthusiast: | 🌐 OSINT | 📈 Vulnerability Assesment | 🛠️ VAPT

Following
  • Vickie Li

    Vickie Li

  • Rahul Bhichher

    Rahul Bhichher

  • Sara V

    Sara V

  • Saif Bhatti

    Saif Bhatti

  • Pine Damian _{D3Mi}

    Pine Damian _{D3Mi}

See all (45)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams