Jasper Alblas
Jasper Alblas
Mastering Data & Cybersec

Welcome to this walkthrough of the Sysmon Room on TryHackMe. In this room we learn about how to utilize Sysmon to monitor and log your endpoints and environments. Part of the Windows Sysinternals package, Sysmon is similar to Windows Event Logs with…

Welcome to this walkthrough of the Snort Challenge: Live Attacks Room on TryHackMe. In this Snort challenge room we get to practice our newly aquired Snort skills to cement our knowledge further. This room follows upon the theory learned in…

Welcome back everyone! Today I want to share with you my notes on how to approach the majority of CTF challenge you participate in. I will go through all of the required steps to have success, and mention basic tools…

Hi! It is time to look at the Devel machine on Hack The Box. This challenge has it all: NMap, Metasploit, remote code execution and exploits. Let’s have fun! This machine is currently free to play to promote the new…

Welcome! It is time to look at the Lame machine on HackTheBox. I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by playing HTB machines.Join me on learning…

This retired machine called Legacy, is running Windows XP (not Windows 2000), and it’s vulnerable to a well-known exploit: MS08-067, a critical vulnerability in the Server service that allows for remote code execution. In this guide, we’ll walk through the…

Welcome! It is time to look at the Nibbles machine on HackTheBox. Nibbles is a fairly simple machine, however with the inclusion of a login blacklist, it is a fair bit more challenging to find valid credentials. Luckily, a username…

Welcome! It is time to look at the final CTF-like room on the Complete Beginner path of THM. This room is called Steel Mountain and I am exited to look at it since we will use metasploit for initial access,…

Hi! Welcome to this walkthrough on the What The Shell room on TryHackMe. In this room we get a very thorough introduction to sending and receiving reverse/bind shell when exploiting target machines. This room is quite theory intensive, and I…

Hi! Welcome to this walkthrough on the TryHackMe: Blue room on TryHackMe. In this room we deploy & hack into a Windows machine, leveraging common misconfigurations issues. We will also get some practice with common tools such as NMap and…

Hi! It is time to look at the third part of the Metasploit rooms on TryHackMe, this part covering Meterpreter. In this walkthrough we will cover Meterpreter, what it is used for, and see how in-memory payloads can be used…

Hi! It is time to look at the TryHackMe: Metasploit Exploitation room, in which we will learn how to use Metasploit for vulnerability scanning and exploitation. Room URL: I am making these walkthroughs to keep myself motivated to learn…