Motasem Hamdan
@ManMotasem
Followers
1K
Following
388
Media
1K
Statuses
2K
Media Strategist & Cyber Mentor
Istanbul, Turkey
Joined August 2013
https://t.co/qPQXlxOhJs So TryHackMe pushed a pretty big refresh to the SOC Level 1 path recently, and a lot of people are confused about what's actually new. I just finished digging through the update, so here’s my TL;DR: -They added 19 challenge rooms to the path. -5 of those
motasem-notes.net
The SOC Level 1 Path used to be one of the most popular journeys on TryHackMe. It taught thousands of newcomers how to investigate alerts
0
0
0
Seriously. I see so many creators with good traffic who are flat broke. Why? Because they're focusing on the wrong metric. You're not building a view-counter, you're building a business. Here's the lightbulb moment: What are you actually building? Authority: People trust your
0
0
0
https://t.co/hMvMUc0yNn As I promised yesterday, the full video breakdown of The Windows Update Hack is now out CVE-2025-59287 is an unauthenticated remote code execution flaw that allows attackers to send a single crafted cookie and get SYSTEM-level control over WSUS servers.
0
0
1
Imagine patching your network… and installing malware instead.T Hackers have been aexploiting a critical RCE in Microsoft WSUS , the very system that patches Windows.CVE-2025-59287 lets attackers run code as SYSTEM and even push fake updates across networks. I broke it down
motasem-notes.net
In mid-October 2025 a dangerous unauthenticated remote-code-execution bug in Windows Server Update Services (WSUS) was disclosed and quickly weaponized.
0
0
0
Content Monetization in 2026 will not be about going viral. It’s going to be about system design. Creators who win today don’t chase algorithms , they build ecosystems. The old model is dead: You post → hope → wait In 2026, creators don’t depend on platforms. They design
0
0
0
https://t.co/46DNxr6yYN Active Directory is the backbone of every Windows domain , know the theory, then map it fast. I wrote a concise walkthrough of the Active Directory Basics room from the TryHackMe CompTIA Pentest+ path and boiled it down to the tactical things you
motasem-notes.net
Microsoft's Active Directory is the backbone of the corporate world. It simplifies the management of devices and users within a corporate environment. In this room, we'll take a deep dive into the...
0
0
0
https://t.co/0ViA3YfbL8 I built multiple online brands from a single laptop , in cybersecurity, movies, gaming & marketing. Not from luck. From systems. From years of trial, failure, and consistency. → Cybersecurity: born from my time as a full-time analyst. → Movies &
motasem-notes.net
I wanted to write, teach, and share what I loved , cybersecurity, storytelling, and the art of building online.
0
0
0
https://t.co/jv7lcqafLS Nmap isn’t just for port lists , it’s a toolkit for stealthy enumeration and IDS evasion. TryHackMe’s “Net Sec” challenge shows how Nmap + Hydra find hidden services, discover flags in HTTP/SSH headers, and even bypass IDS by probing non-standard ports
motasem-notes.net
We used Nmap and Hydra to perform scanning and enumeration of services and credentials. We also used Nmap to bypass an intrusion detection system. This was as part of net sec challenge from Tryhackme.
0
0
0
https://t.co/iV1cK9qYKP Zeek turns raw packets into forensic, context-rich logs , perfect for NSM & incident response. Run it live on a tap/span for continuous visibility, or use zeek -C -r sample.pcap to analyze PCAPs offline , same engine, different mode. Monitor conn.log,
motasem-notes.net
We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security monitoring, incident analysis and logs investigation.
0
0
0
https://t.co/UInRT4ID0K If you build or audit web auth, this short TryHackMe walkthrough is worth a read. It explains two practical JWT attack patterns you’ll see in CTFs , and sometimes in the wild: Learn two CTF-ready tricks attackers use: switching alg (RS256 → HS256) to
motasem-notes.net
We covered JSON Web Tokens and its associated vulnerabilities. In JWT, the signature can be changed or the header to bypass authentication controls
0
0
0
https://t.co/3pt2R7ka6v New deep-dive: how hackers smuggle data out (DNS tunneling, rclone, cloud POSTs), what signals SOCs watch for, and a practical triage playbook you can use today. Look for: high-entropy DNS, weird TXT queries, large HTTP POSTs, suspicious PowerShell.
0
0
1
https://t.co/ltoWAvqsL6 Nessus is a vulnerability scanner built to find vulns precisely (won’t assume a web app lives on port 80 if it’s not there). Good GUI, many scan templates (host discovery, credentialed audits, web app tests). Useful for labs and real assessments when
motasem-notes.net
Nessus vulnerability scanner , just like the name says , is built to do one thing really well: find vulnerabilities.
0
0
2
https://t.co/Iy24B9R45n Got a Mr. Robot–style Windows box? 🕵️♂️ I just finished a clean #TryHackMe Steel Mountain. Practical and compact lab for Windows privilege escalation. TL;DR: initial RCE on HttpFileServer 2.3 (port 8080) → netcat reverse shell as Bill → upgrade to
motasem-notes.net
Break into a Mr. Robot–style Windows lab: gain initial foothold with Metasploit, probe the system with PowerShell to map privilege weaknesses
0
0
1
Finished TryHackMe’s Retro box , 3 ways to SYSTEM: WordPress creds → PHP shell RDP + CVE-2017-0213 kernel exploit UAC/cert UI trick that spawns SYSTEM IE (then cmd via Save dialog). Short writeup + commands here: https://t.co/C4lLwcgTOj
#OSCP #TryHackMe #infosec
motasem-notes.net
I tackled the "Retro" machine from TryHackMe, a Windows Server 2016 box which perfectly fits to be an OSCP prep material.
0
0
0
https://t.co/xHnSIxWG9M CCSP vs AWS Security Two cloud security certs. Two completely different career paths. CCSP = Multi-cloud strategy, architecture, leadership AWS Security = Hands-on defense in AWS CCSP → Architect, Consultant, CISO track AWS Security → Engineer,
0
0
0
Just dropped an article about Sigma language https://t.co/TNWRGjJa08 Most SOC analysts struggle to standardize detections across platforms. That’s where Sigma comes in , a YAML-based, open-source language that makes writing and sharing SIEM rules effortless. Sigma is an
motasem-notes.net
In simple terms, Sigma gives analysts a universal language for detections, making it easier to share, adapt, and reuse detection logic across different SIEMs and tools.
0
0
0
https://t.co/HKNtT5yLXN They hacked Ticketmaster, breached Google, and sold half a billion user records on the dark web. You’ve probably never heard of them. They call themselves ShinyHunters. 👇 1️⃣ They don’t use ransomware. 2️⃣ They’ve hit brands like Google, LVMH,
0
0
2