🐉 neospace ~

          • Man-in-the-Middle Attack MITM
          • Monoalphabetic Substitution Cipher - A Detailed Explanation
          • XSS vs HTML
            • 🔗 Computer Architecture - CYBVU 23.2
            • Computer Organization
            • Introduction to Computer Architecture
            • 🔗 Data Communications and Networks
            • Lecture 1 - Introduction
            • Lecture 2 - Email Services
            • Lecture 3 - Data and Signals
            • Lecture 4 - Communication Medium
            • Lecture 5 - Wireless Medium
            • 🔗 Java - CYBVU 23.2
            • 22 Aug Lecture Note
            • 30th Aug Assignment Submission
            • Arithmetic Expressions
            • Data Types
            • Hello World, Escape Sequences, Comments
            • Introduction to Java
            • Java Full RECAP
            • String args
            • User input (Scanner)
            • Variables
            • 🔗 Operating Systems
            • Introduction to Operating Systems
            • Lec 2 Process Management
            • Lec 3 Process Control Management
            • Lec 4 Memory Management
            • Lec 5 Virtual Memory Management
            • 🔗 Web Application Development - CYBVU 23.2
            • All CSS Concepts at once (module related)
            • Client-Server Model
            • Essential JavaScript Concepts for This Module Pt.1
            • HTTP vs HTTPS
            • Introduction to HTML Part A
            • Introduction to HTML Part B
            • JavaScript Form Validation Pt. 3
            • JavaScript Pt. 2
            • PHP Pt. 1
            • PHP Pt. 2
            • Static vs Dynamic Pages
            • Website vs WebApp
            • What is the INTERNET?
            • World Wide Web (WWW)
          • Spring 24' Y1S2
            • 🔗 Cybersec Essentials
            • Lab 1 CSES
            • Lab 2 CSES
            • Lab 3 CSES
            • Lab 4 CSES
            • Lab 5 CSES
            • Lab 6 CSES
            • Lab 7 CSES
            • Week 1 - Introduction to Security
            • Week 2 - Malware and Social Engineering Attacks
            • Week 3 - Application and Networking-Based Attacks
            • Week 4 - Cryptography
            • Week 5 - Cryptography Part-II
            • 🔗 Server Administration and Management
            • Lab 1 SAAM
            • Lab 3 SAAM
            • Presentation Case Study
            • Week 1 Introduction to Windows Server
            • 🔗 Digital Forensics and Ethical Hacking
            • Lab 1 DFEH
            • Lab 2 DFEH
            • Lab 3 DFEH
            • Lab 4 DFEH
            • Lab 6 DFEH
            • Lab 7 DFEH
            • Lab 8 DFEH
            • Lab 9 DFEH
            • Research About Hashing
            • Week 1 - Intro to Digital Forensics and its Processes
            • Week 1 DFEH Before Class Activities
            • Week 2 - Computer Forensics
            • Week 3 - Mobile Forensics
            • Week 3 DFEH Before Class
            • Week 5 - Investigative Reports and Legal Acceptance
            • 🔗 Introduction to Ict Management
            • NIT2171 ICT Management Test 1
            • Week 1 - ICT trends and challengers
          • Winter 24' Y2S1
                • 🔗 Module 1 Foundations of Cybersecurity
                • Common CyberSec Terminology
                • Core skills for cybersec professionals
                • Course 1 Overview
                • Google Cybersecurity Certificate Overview
                • Helpful resources and tips
                • Importance of CyberSecurity
                • Introduction to Cybersecurity
                • My Path to CyberSecurity
                • Nikki A day in the life of a security engineer
                • Responsibilities of an entry-level cybersecurity analyst
                • Transferable and technical cybersecurity skills
                • Veronica My path to working in cybersecurity
                • Welcome to the Google Cybersecurity Certificate
                • Wrap-up Module 01
                • 🔗 Module 2 Foundations of Cybersecurity
                • Attacks in the digital age
                • Common attacks and their effectiveness
                • Determine the type of attack
                • Glossary terms from module 2
                • Introduction to the eight CISSP security domains Part 1
                • Introduction to the eight CISSP security domains Part 2
                • Keep Your Cool during a data breach
                • Past CyberSecurity Attacks
                • Understand attackers
                • Welcome to module 2
                • Wrap-up Module 02
              • Foundations of Cybersecurity
            • 🔗 Google Cybersecurity Professional Certificate
          • 🔗 HackTheBox CTF
          • Low Logic
          • 🔗 HTB Academy
          • Introduction to Active Directory
          • Introduction to Networking
          • Networking Overview
            • 1. Read YAML data - Python to process YAML with Codespaces
            • Career Essentials in GitHub Professional Certificate
            • Docker
            • How Actions Works
            • Python to process YAML with Codespaces
            • 🔗 Prepare for the GitHub Foundations Certification
            • Branches
            • Changing History
            • Deleting and renaming files
            • git diff
            • Git stash and clean
            • Github Options
            • Ignore Files - gitignore
            • Manage Conflicts
            • Pushing to Github
            • Setting up Git
            • Understanding Environments
            • What is Git
            • What is Github
            • What is Version Control
          • IP Addressing and Subnetting
          • More about -sV and -sC
          • More About Alternate Data Stream
          • More About JQ
          • Understanding `$0` in awk
          • Understanding 2>&1 in Unix-like Shells
            • 🔐 Ethereum Fundamentals
            • Blockchain and Hashing
            • Blockchain Benefits and Disadvantages
            • Blockchain Operations
            • Ethereum Basics
            • The New Blockchain - Blockchain 2.0
          • 🔗 PicoGym
          • Big Zip
          • Binhexa
          • Blame Game
          • Bookmarklet
          • CanYouSee
          • Collaborative Development
          • Commitment Issues
          • Cookies
          • dont-you-love-banners
          • endianness
          • First Find
          • Glory of the garden
          • Includes
          • Information
          • Inspect HTML
          • Inspector
          • interencdec
          • Local Authority
          • runme.py
          • SansAlpha
          • Scan Surprise
          • Scavenger Hunt
          • Secret of the Polyglot
          • Super SSH
          • Time Machine
          • Unminify
          • Verify
          • WebDecode
          • Where are the robots
          • Pi Metasploitable
          • Raspberry Pi Kali-Linux Headless Setup
            • Advent of Cyber 2024 ⛄️❄️
            • Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
            • Day 2 One man's false positive is another man's potpourri
            • Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
            • Day 4 I'm all atomic inside!
            • Day 5 SOC-mas XX-what-ee
            • Day 6 If I can't find a nice malware to use, I'm not going
            • Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
            • Blue
            • Light
            • Command Line
            • Cryptography
            • Networking
            • Networking Fundamentals
            • Windows and AD Fundamentals
            • CyberSecurity 101
            • Active Directory Basics
            • Cryptography Basics
            • Defensive Security Intro
            • Intro to LAN
            • Linux Shells
            • Metasploit Introduction
            • Networking Concepts
            • Offensive Security Intro
            • Public Key Cryptography Basics
            • Search Skills
            • Summary - Active Directory Basics
            • What is Networking
            • Windows Command Line
            • Windows Fundamentals 1
            • Windows Fundamentals 2
            • Windows Fundamentals 3
            • Windows PowerShell
          • 🐧 TryHackMe
          • TryHackMe TODO List
          • 100+ Docker Concepts you Need to Know
          • before you code, learn how computers work
          • Docker in 100 Seconds
          • Kerberos Authentication
          • Kubernetes 101
          • Youtube Learnings
      • About Me
      • Blog Posts 📚

    📝 Latest Posts

    • 100+ Docker Concepts you Need to Know

      Feb 13, 2025

      • Docker
      • DevOps
      • Blog
    • Kubernetes 101

      Feb 13, 2025

      • DevOps
      • Blog
    Home

    ❯

    自学

    ❯

    TryHackMe

    ❯

    🐧 TryHackMe

    🐧 TryHackMe

    Feb 13, 20251 min read

    Basics

    • Search Skills
    • Active Directory Basics
    • Cryptography Basics
    • Defensive Security Intro
    • Intro to LAN
    • Linux Shells
    • Metasploit Introduction
    • Offensive Security Intro
    • Public Key Cryptography Basics
    • What is Networking
    • Windows Command Line
    • Windows Fundamentals 1
    • Windows Fundamentals 2
    • Windows Fundamentals 3
    • Windows PowerShell

    Paths

    • CyberSecurity 101

    Graph View

    • Basics
    • Paths

    Backlinks

    • Neo's Digital Garden 🌱

    NeoSpace©2024 🐉