Advanced Search
Search Results
120 total results found
IAAA Model
Overview The IAAA model consists of four essential pillars—Identification, Authentication, Authorization, and Accountability—that work together to protect sensitive information and resources in an organization. Identification establishes who a user claims to b...
Identity
Overview Identification is the process by which a user, process, or system claims a specific identity through a unique identifier, without any verification of that claim's truthfulness. Identifiers can take various forms including usernames (such as tanderson,...
Authentication
Overview Authentication is the process of verifying a user's or system's claimed identity, distinct from identification which is simply claiming that identity. The primary mechanisms for authentication include something you know (passwords, PINs), something yo...
Advent of Cyber
Overview Room URL: Difficulty: Category: Date Completed: Objective objective Table of Contents Introduction Walk Through Lessons Learned Resources Introduction This is an introduction to the room. Walk Through This is the walkthrough section Lessons Learn...
About
Campaign Overview Setting: Wareville, home of The Best Festival Company (TBFC) Event: SOCMAS - the annual cyber security celebration Threat Level: Critical Purpose: Each mission teaches essential cybersecurity skills while uncovering clues about King Malhare's...
Password Pandemonium
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Create a password that passes all system checks and isn’t found in the leaked password list. Table of Contents Introduc...
The Suspicious Chocolate.exe
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Determine if chocolate.exe is safe or infected. Table of Contents Introduction Walk Through Lessons Learned Resources ...
Welcome to the AttackBox!
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Find and read the hidden welcome message inside your AttackBox. Table of Contents Introduction Walk Through Lessons Learn...
The CMD Conundrum
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Find the hidden flag file using Windows commands. Table of Contents Introduction Walk Through Lessons Learned Resources ...
Linux Lore
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Locate McSkidy’s hidden message in his Linux home directory. Table of Contents Introduction Walk Through Lessons Learned ...
The Leak in the List
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Check if McSkidy’s email has appeared in a breach. Table of Contents Introduction Walk Through Lessons Learned Resources ...
WiFi Woes in Wareville
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Log into the router and secure it with a strong new password. Table of Contents Introduction Walk Through Lessons Learne...
The App Trap
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Find and remove the malicious connected app. Table of Contents Introduction Walk Through Lessons Learned Resources Intro...
The Chatbot Confession
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Identify which chatbot messages contain sensitive information. Table of Contents Introduction Walk Through Lessons Learne...
The Bunny’s Browser Trail
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Find the unusual User Agent in the HTTP log. Table of Contents Introduction Walk Through Lessons Learned Resources Intr...
Working with Linux CLI
Overview Room URL: https://tryhackme.com/room/linuxcli-aoc2025-o1fpqkvxti Difficulty: Easy Category: Linux Command Line Date Completed: 12/1/2025 Objectives Learn the basics of the Linux command-line interface (CLI) Explore its use for personal objectives...
Phishing Exercise for TBFC
Overview Room URL: https://tryhackme.com/room/phishing-aoc2025-h2tkye9fzU Difficulty: Easy Category: Phishing Date Completed: 12/2/2025 Objectives Understand what social engineering is Learn the types of phishing Explore how red teams create fake login page...
Vulnerability Write Up
Date: [YYYY-MM-DD] Category: [Penetration Testing / Web Application Security / Network Defense / Threat Analysis / etc.] Tools Used: [Nmap, Metasploit, Wireshark, Burp Suite, Python, etc.] Target/Scope: [Specify target system, application, or network segment] ...