Joe Raine
Cybersecurity Professional
Joe Raine
Cybersecurity Professional
April 4, 2024 BTLO – Follina Challenge

Brief Setup Hardware: 1x Kali Virtual Machine File Location: /home/kali/Desktop/Malware/FollinaChallenge/sample/sample.doc Questions Question 1) What is the SHA1 hash value of…

January 22, 2024 The Power of the Incident Response Plan

Incident response is a key element of SOC and having the appropriate resources and procedures in place beforehand is a…

October 23, 2023 Journey to CYSA+

I am happy to announce I have taken and passed the examination for the CYSA+ examination. While I should be…

August 2, 2023 Web App Vulnerabilities – Types and Safeguarding

As we move onto preparing for the CYSA+ 002 exam I am going to be reinforcing some of my learning…

July 6, 2023 Analysis – MOVEit File Transfer Vulnerability

Within the Cybersecurity field it is essential to be up to date with current events, especially those with potentially critical…

June 26, 2023 Windows System Processes – what they are and detecting malicious intrusion or fakes

I’m currently learning the ‘Core Windows Processes’ module on TryHackMe and a topic which stuck out to me is the…

June 22, 2023 [THM] OSINT Exercise

Difficulty: Easy Objectives To start this task we are provided with an image. The image is of the Windows XP…

June 14, 2023 [PRACTICE1] – [THM EASY] – Basic Pentesting

Now we have a basic understanding of enumeration and basic exploiting, I will be starting on some practice sessions. This…

June 11, 2023 THM – Hacking SQL

Finishing off the extended Network Services section of TryHackMe is SQL. I will cover SQL in a later knowledge article…

June 11, 2023 THM – Enumerating and Exploiting a SMTP server

To follow up on todays knowledge post we are doing some practice on some active footprinting, enumerating and exploiting a…