Advanced Search
Search Results
178 total results found
Authenticating With Passwords
Overview Cryptography is essential for protecting passwords both in transit (via SSL/TLS) and at rest (in databases), where the latter requires secure storage methods to prevent exposure during a breach. Simply hashing passwords is insufficient due to rainbow ...
Identity & Access Management
IAAA Model
Overview The IAAA model consists of four essential pillars—Identification, Authentication, Authorization, and Accountability—that work together to protect sensitive information and resources in an organization. Identification establishes who a user claims to b...
Identity
Overview Identification is the process by which a user, process, or system claims a specific identity through a unique identifier, without any verification of that claim's truthfulness. Identifiers can take various forms including usernames (such as tanderson,...
Advent of Cyber 2025
Authentication
Overview Authentication is the process of verifying a user's or system's claimed identity, distinct from identification which is simply claiming that identity. The primary mechanisms for authentication include something you know (passwords, PINs), something yo...
Prep Track
Get ready for the Advent of Cyber 2025 with the "Advent of Cyber Prep Track", a series of warm-up tasks aimed to get beginners ready for this year's event.
Templates
Advent of Cyber
Overview Room URL: Difficulty: Category: Date Completed: Objective objective Table of Contents Introduction Walk Through Lessons Learned Resources Introduction This is an introduction to the room. Walk Through This is the walkthrough section Lessons Learn...
About
Campaign Overview Setting: Wareville, home of The Best Festival Company (TBFC) Event: SOCMAS - the annual cyber security celebration Threat Level: Critical Purpose: Each mission teaches essential cybersecurity skills while uncovering clues about King Malhare's...
Password Pandemonium
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Create a password that passes all system checks and isn’t found in the leaked password list. Table of Contents Introduc...
The Suspicious Chocolate.exe
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Determine if chocolate.exe is safe or infected. Table of Contents Introduction Walk Through Lessons Learned Resources ...
Welcome to the AttackBox!
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Find and read the hidden welcome message inside your AttackBox. Table of Contents Introduction Walk Through Lessons Learn...
The CMD Conundrum
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Find the hidden flag file using Windows commands. Table of Contents Introduction Walk Through Lessons Learned Resources ...
Linux Lore
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Locate McSkidy’s hidden message in his Linux home directory. Table of Contents Introduction Walk Through Lessons Learned ...
The Leak in the List
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Check if McSkidy’s email has appeared in a breach. Table of Contents Introduction Walk Through Lessons Learned Resources ...
WiFi Woes in Wareville
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Log into the router and secure it with a strong new password. Table of Contents Introduction Walk Through Lessons Learne...
The App Trap
Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objective Find and remove the malicious connected app. Table of Contents Introduction Walk Through Lessons Learned Resources Intro...