Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

TryHackMe Logless Hunt Full Walkthrough 2025 - Detecting Attacks Without Security Logs

Автор: Djalil Ayed

Загружено: 2025-05-03

Просмотров: 1314

Описание:

💧Can You Detect a Logless Attack? TryHackMe - Logless Hunt Walkthrough

💧Detect every attack step on a Windows machine even after threat actors cleared Security logs.

💧Threat actors clearing logs? No problem! Join us as we explore the TryHackMe "Logless Hunt" room and discover techniques to detect every stage of a cyber attack on a Windows system, even without traditional Security logs. We'll investigate web access, PowerShell commands, RDP logins, persistent threats, and credential harvesting. Test your blue team skills!


😺 [00:00] Task 1 & 2: Introduction & Scenario

😺 [02:47] Task 3: Initial Access | Web Access Logs
⚡What is the title of the HR01-SRV web app hosted on 80 port?
⚡ Which IP performed an extensive web scan on the HR01-SRV web app?
⚡What is the absolute path to the file that the suspicious IP uploaded?
⚡ Clearly, that's suspicious! What would you call the uploaded malware / backdoor?

😺 [11:36] Task 4: From Web to RDP | PowerShell Logs
⚡What was the first command entered by the attacker?
⚡What is the full URL of the file that the attacker attempted to download?
⚡What command was run to exclude the file from Windows Defender?
⚡Which remote access service was tunnelled using the uploaded binary?

😺 [25:13] Task 5: Breached Admin | RDP Session Logs
⚡What is the timestamp of the first suspicious RDP login?
⚡What user did the attacker breach?
⚡What IP is shown as the source of the RDP login?
⚡What is the timestamp when the attacker disconnected from RDP?

😺 [29:24] Task 6: Persistence Traces | Scheduled Tasks
⚡What is the name of the suspicious scheduled task?
⚡When was the suspicious scheduled task created?
⚡What is the task's "Trigger" value as shown in Task Scheduler GUI?
⚡What is the full command line of the malicious task?

😺 [35:07] Task 7: Credential Access | Windows Defender
⚡What is the threat family ("Name") of the first quarantined file?
⚡And what is the threat family of the next detected malware?
⚡What is the file name of the downloaded Mimikatz executable?
⚡Finally, which Mimikatz command was used to extract hashes from LSASS memory?

Room Link: https://tryhackme.com/room/loglesshunt

👍 Don’t forget to like, subscribe, and hit the bell icon for more cybersecurity walkthroughs!

👍 these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge.

#TryHackMe #LoglessHunt #BlueTeam #DFIR #WindowsSecurity #Cybersecurity

TryHackMe Logless Hunt Full Walkthrough 2025 -  Detecting Attacks Without Security Logs

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

macOS Forensics: Artefacts | Hands-On with Key Artefacts | TryHackMe

macOS Forensics: Artefacts | Hands-On with Key Artefacts | TryHackMe

TryHackMe Великое Исчезновение - Побочный квест «Пришествие Кибер» - Полное прохождение 2025 года

TryHackMe Великое Исчезновение - Побочный квест «Пришествие Кибер» - Полное прохождение 2025 года

OWASP Top 10 2025: Application Design Flaws TryHackMe WalkThrough

OWASP Top 10 2025: Application Design Flaws TryHackMe WalkThrough

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Изучите Microsoft Active Directory (ADDS) за 30 минут

Изучите Microsoft Active Directory (ADDS) за 30 минут

PowerShell 7 Tutorials for Beginners : Fundamentals

PowerShell 7 Tutorials for Beginners : Fundamentals

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

Windows Command Line Tools

Windows Command Line Tools

Путин резко меняет тактику / Впервые применено секретное оружие

Путин резко меняет тактику / Впервые применено секретное оружие

60 Hacking Commands You NEED to Know

60 Hacking Commands You NEED to Know

SOC Analyst Skills - Wireshark Malicious Traffic Analysis

SOC Analyst Skills - Wireshark Malicious Traffic Analysis

TryHackMe Введение в анализ вредоносного ПО — полное пошаговое руководство 2026

TryHackMe Введение в анализ вредоносного ПО — полное пошаговое руководство 2026

PowerShell для хакеров

PowerShell для хакеров

Intro to Logs: Tryhackme SOC levl 2

Intro to Logs: Tryhackme SOC levl 2

Emacs в 2026: Секретное оружие или старый хлам? |vim, vscode, lisp, org-mode|Podlodka Podcast #460

Emacs в 2026: Секретное оружие или старый хлам? |vim, vscode, lisp, org-mode|Podlodka Podcast #460

this MP3 file is malware

this MP3 file is malware

Как использовать просмотр событий Windows для аудита кибербезопасности

Как использовать просмотр событий Windows для аудита кибербезопасности

Учебник Base44 для начинающих — пошагово

Учебник Base44 для начинающих — пошагово

Орешник это модернизированный Рубеж? И как украинцы узнали об ударе 9 января заранее?

Орешник это модернизированный Рубеж? И как украинцы узнали об ударе 9 января заранее?

Claude Code Clearly Explained (and how to use it)

Claude Code Clearly Explained (and how to use it)

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com