Automating Network Investigations with TShark on the Command Line

The TShark: CLI Wireshark Features room takes what you learn in the basics and expands it by diving deeper into the command-line features that make TShark so powerful. In this room, I practiced using advanced filters, extracting specific fields from packet captures, and generating reports that summarize traffic without needing to scroll through endless packets. […]

Automating Network Investigations with TShark on the Command Line Read More »

From Wireshark to TShark: Learning Network Analysis on the Command Line

The TShark: The Basics room on TryHackMe introduces you to TShark, the command-line version of Wireshark. While Wireshark uses graphical interface, TShark offers the same packet analysis capabilities in a lightweight, scriptable format. In this room, you learn how to capture and filter traffic directly from the terminal, analyze packets using specific display filters, and

From Wireshark to TShark: Learning Network Analysis on the Command Line Read More »

Tracking Down Suspicious Traffic with Wireshark

I completed the Wireshark: Traffic Analysis room on TryHackMe, which gave me hands-on practice using Wireshark to investigate different types of network activity. Instead of just learning how to capture packets, this room focused on analyzing real-world scenarios like HTTP traffic, DNS lookups, FTP transfers, and even malicious activity hidden in the data. I learned

Tracking Down Suspicious Traffic with Wireshark Read More »

Hands-On Network Analysis: Completing the Zeek Exercises on TryHackMe

I completed the Zeek Exercises room on TryHackMe, which gave me hands-on practice using Zeek to analyze network traffic and investigate potential security incidents. Unlike the introductory Zeek rooms, this one focused on applying what I’d learned by answering questions and solving problems using real packet captures. I practiced parsing Zeek logs for different protocols

Hands-On Network Analysis: Completing the Zeek Exercises on TryHackMe Read More »

Tracking Suspicious Activity with Zeek on TryHackMe

I completed the ZeekBro room on TryHackMe, which introduced me to Zeek, a powerful network monitoring and analysis tool often used in cybersecurity investigations. The room walked me through how to analyze network traffic and extract meaningful information from packet captures without having to inspect every single packet manually. I learned how Zeek organizes traffic

Tracking Suspicious Activity with Zeek on TryHackMe Read More »

Exploring Network Forensics: My First Steps with NetworkMiner

I completed the NetworkMiner room on TryHackMe, which introduced me to a powerful network forensics tool that makes analyzing packet captures a lot more approachable. Instead of digging through raw data line by line, NetworkMiner automatically organizes traffic into categories like hosts, files, images, credentials, and sessions. In this room, I learned how to load

Exploring Network Forensics: My First Steps with NetworkMiner Read More »

Learn the fundamentals of logging, data sources, collection methods and principles to step into the log analysis world

I just completed Intro to Logs room on TryHackMe. Learn the fundamentals of logging, data sources, collection methods and principles to step into the log analysis world. Intro to Logs https://tryhackme.com/room/introtologs

Learn the fundamentals of logging, data sources, collection methods and principles to step into the log analysis world Read More »