Sean Lee

Sean Lee @seanleeys

About: An ambitious cybersecurity student. Interested in all things cybersecurity. 💡 Motto: “Know the attack to build the defence.”

Joined:
Mar 10, 2025

Sean Lee
articles - 49 total

TryHackMe: Smol

At the heart of Smol is a WordPress website, a common target due to its extensive plugin ecosystem....

Learn More 0 0May 10

TryHackMe: Hammer

Nmap Scan We started off with an nmap scan As we can observe, we see 2 ports are...

Learn More 0 0May 10

TryHackMe: Brim

1. What is Brim? What is Brim? Brim is an open-source desktop application that...

Learn More 0 0May 3

TryHackMe: Zeek Exercises

1. Anomalous DNS An alert triggered: "Anomalous DNS Activity". The case was assigned to...

Learn More 0 0May 3

TryHackMe: Zeek

1. Introduction to Network Monitoring Approaches Network monitoring is a set of management...

Learn More 0 0May 2

TryHackMe: NetworkMiner

Introduction to Network Forensics Network Forensics is a specific subdomain of the...

Learn More 0 0May 2

TryHackMe: Snort Challenge - Live Attacks

Scenario 1: Brute Force First of all, start Snort in sniffer mode and try to figure out...

Learn More 0 0Apr 26

TryHackMe: Snort Challenge - The Basics

1. Writing IDS Rules (HTTP) Flag 1 Navigate to the task folder and use the...

Learn More 0 0Apr 26

TryHackMe: Snort

1. Snort Before diving into Snort and analysing traffic, let's have a brief overview of...

Learn More 0 0Apr 25

TryHackMe: Traffic Analysis Essentials

Network Security The essential concern of Network Security focuses on two core concepts:...

Learn More 0 0Apr 25

TryHackMe: MISP

1. Introduction What is MISP? MISP (Malware Information Sharing Platform) is an...

Learn More 0 0Apr 25

TryHackMe: OpenCTI

OpenCTI OpenCTI is another open-sourced platform designed to provide organisations with...

Learn More 0 0Apr 25

LetsDefend: SOC274 - Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)

Upon examining source IP of 144[.]172[.]79[.]92, we see that it is flagged as malicious. As the...

Learn More 0 0Apr 25

LetsDefend: SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919]

🛡️ Security Incident Report: CVE-2024-24919 Exploitation Attempt Date: June 6, 2024 Time: 03:12...

Learn More 0 0Apr 25

LetsDefend: SOC335 - CVE-2024-49138 Exploitation Detected

Incident Case Report Case Title: CVE-2024-49138 Exploitation via svohost.exe and Remote...

Learn More 0 0Apr 25

TryHackMe: Yara

What is Yara? All about Yara  "The pattern matching swiss knife for malware researchers...

Learn More 0 0Apr 6

TryHackMe: Threat Intelligence Tools

Threat Intelligence Threat Intelligence Classifications: Threat Intel is geared...

Learn More 0 0Apr 6

TryHackMe Hackfinity Battle Writeups

This Google Drive link contains all the writeups I could compile from solving various CTF challenges....

Learn More 0 0Mar 21

TryHackMe: HTTP/2 Request Smuggling

HTTP/2 uses a binary format and clearly defines boundaries for elements in...

Learn More 0 0Mar 19

TryHackMe: HTTP Request Smuggling

Headers Involved Emphasis on headers: Content-Length that states the number of...

Learn More 1 0Mar 19

TryHackMe: CORS & SOP

Same Origin Policy (SOP) Policy that instructs how web browsers interact between web...

Learn More 1 0Mar 18

TryHackMe: DOM-Based XSS

Which sinks can lead to DOM-XSS vulnerabilities? The following are some of the main sinks...

Learn More 0 0Mar 18

TryHackMe: XSS

JavaScript for XSS In web browser, go Inspect Element, then go to Console. Let’s review...

Learn More 0 0Mar 17

TryHackMe: Prototype Pollution

In JS, Prototype functions similarly to Classes Difference Between Class and Prototype in...

Learn More 0 0Mar 17

TryHackMe: Race Conditions

Real World Analogy Example A Let’s consider this scenario: A bank account has...

Learn More 2 0Mar 17

TryHackMe: File Inclusion, Path Traversal

Types Relative vs Absolute Pathing Relative Pathing: Locates files based...

Learn More 0 0Mar 16

TryHackMe: SSRF

What is SSRF When developing networked software, it's common to make requests to external...

Learn More 0 0Mar 16

TryHackMe: Insecure Deserialisation

Serialisation Serialisation is just like taking different pieces of information (like...

Learn More 2 0Mar 16

TryHackMe: ORM Injection

What is ORM? Object-relational Mapping (ORM) is a programming technique that facilitates...

Learn More 1 0Mar 15

TryHackMe: LDAP Injection

Understanding LDAP and its Role in Directory Services LDAP (Lightweight Directory Access...

Learn More 1 0Mar 15