Open in app

Sign In

Write

Sign In

Ritam Dey
Ritam Dey

6 Followers

Home

Lists

About

Oct 3, 2022

MSHTML — LetsDefend

Scenario/Challenge Details 2021’s 0-Day MSHTML This refers to CVE-2021–40444 vulnerability present in MS Office suite Challenge link here Tools used oleobj re-search.py zipdump.py number-to-string.py What is CVE-2021–40444? The CVE-2021–40444 vulnerability was a vulnerability found in the MS Office suite that can be triggered using a malicious external OLE relationship. The vulnerability uses CAB files and path traversal…

Letsdefendio

2 min read

MSHTML — LetsDefend
MSHTML — LetsDefend
Letsdefendio

2 min read


Jun 2, 2022

Event ID: 5— Let’s Defend

Trigger Rule: SOC102 — Proxy — Suspicious URL Detected — EventID: 5 Event Time: Aug. 29, 2020, 10:50 P.M Level: Security Analyst Source Address: 172.16.17.14 Source Hostname: MikeComputer Destination Address: 198.100.45.154 Destination Hostname: qstride.com Username: Mike01 Request URL: http[:]//qstride[.]com/img/0/ User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36

Soc Analyst

4 min read

Event ID: 5 — Let’s Defend
Event ID: 5 — Let’s Defend
Soc Analyst

4 min read


Apr 5, 2022

Event ID: 43 — Let’s Defend

SOC112 — Traffic to Blacklisted IP Alert Time: Jan, 31, 2021, 11:02 AM Alert Source IP: 172.16.17.21 Alert URL: http://193.239.147.32/OBBBOP.exe Alert Action: Allowed Event Type: Proxy Before we begin the playbook let’s first gather information about the trigger URL. Since the rule name states that the alert was caused to…

Soc Analyst

3 min read

Event ID: 43 — Let’s Defend
Event ID: 43 — Let’s Defend
Soc Analyst

3 min read


Mar 8, 2022

HawkEye — CyberDefenders

Scenario/Challenge Details An accountant at your organization received an email regarding an invoice with a download link. Suspicious network traffic was observed shortly after opening the email. As a SOC analyst, investigate the network trace and analyze exfiltration attempts. Tools used Wireshark Brim VirusTotal First we need to load the PCAP file into Wireshark…

Wireshark

8 min read

HawkEye — CyberDefenders
HawkEye — CyberDefenders
Wireshark

8 min read


Dec 1, 2021

Overpass

Overpass is a vulnerable VM hosted on TryHackMe created by NinjaJc01. …

Tryhackme

5 min read

Overpass
Overpass
Tryhackme

5 min read


Jun 13, 2021

VulNet: dotjar

“VulNet: dotjar” is a new CTF challenge hosted in TryHackMe created by TheCyb3rW0lf. It’s a pretty easy box and has got different ways to get root. Scanning the box and Initial recon First we need to discover what services are running and what ports are open. For that we can use nmap Aggressive scanning, that scans…

Tryhackme

5 min read

Write-up for “VulNet: dotjar”
Write-up for “VulNet: dotjar”
Tryhackme

5 min read

Ritam Dey

Ritam Dey

6 Followers
Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Vickie Li

    Vickie Li

  • Thexssrat

    Thexssrat

  • Kongsec

    Kongsec

  • Katie Paxton-Fear

    Katie Paxton-Fear

See all (35)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams