Home

Logging for Accountability

by: tryhackme I continue my learning of Splunk and logging with this room. This room showcases the importance of accountability when it comes to the incident response. THM also brings up the the Identification, Authentication, Authorization, and Accountability (IAAA)…

Splunk Dashboards and Reports

by: tryhackme, ryla “Splunk is one of the most widely used Security Information and Event Management (SIEM) solutions in enterprise environments. It helps aggregate data from various data sources within an enterprise environment to enhance security monitoring. However, large volumes…

Digital pinboard 4.25.2026

Links to the sites mentioned in this blog: boot.devfreecodecamp.orglearn.microsoft.comacademy.hackthebox.comtryhackme.com With recently finishing the SOCL1 learning path, I have taken a small break from THM and am just doing easier rooms for now. I will get back in the swing of…

Boogeyman 3

by: tryhackme, ar33zy As of 4/17/2026, this is the last room of the SOCL1 Path! Congratulations if you have made it this far! “Due to the previous attacks of Boogeyman, Quick Logistics LLC hired a managed security service provider…

Boogeyman 2

by: tryhackme, ar33zy “This room may require the combined knowledge gained from the SOC L1 Path. We recommend going through the following rooms before attempting this challenge.” Phishing Analysis FundamentalsPhishing Analysis ToolsBoogeyman 1Volatility I’ve just completed the Volatility room and highly recommend it! We are…

Volatility

by: tryhackme “Volatility is a free memory forensics tool developed and maintained by Volatility Foundation, commonly used by malware and SOC analysts within a blue team or as part of their detection and monitoring solutions. Volatility is written in Python and is made…

Core Windows Proccesses

by: tryhackme, ar33zy This room is a pre-requisite for and that room is a pre-requisite for which is a part of the SOCL1 pathway. “In this room, we will explore the core processes within a Windows system.…

Boogeyman 1

by: tryhackme, ar33zy This room looks like it will bring a challenge! It’s rated Medium difficulty. We will be using various tools to anaylze the Tactics, Techniques, and Procedures (TTPs) of the Boogeyman! Prerequisites:Tshark: The BasicsPhishing Analysis FundamentalsPhishing Analysis ToolsWindows Event…

Tempest

by: tryhackme, ar33zy Links to those rooms: Task 2 gives us a quick refresher of Log Analysis and Event Correlation. In Task 3, Preparation – Tools and Artificats, THM goes over hashes and some of the tools we will…

Tshark Challenge 2 Directory

by: tryhackme “Investigate the DNS queries.Investigate the domains by using VirusTotal.According to VirusTotal, there is a domain marked as malicious What is the name of the malicious/suspicious domain? Enter your answer in a defanged format.” “What is the total number of…