ManMotasem Profile Banner
Motasem Hamdan Profile
Motasem Hamdan

@ManMotasem

Followers
1K
Following
388
Media
1K
Statuses
2K

Media Strategist & Cyber Mentor

Istanbul, Turkey
Joined August 2013
Don't wanna be here? Send us removal request.
@ManMotasem
Motasem Hamdan
22 hours
https://t.co/qPQXlxOhJs So TryHackMe pushed a pretty big refresh to the SOC Level 1 path recently, and a lot of people are confused about what's actually new. I just finished digging through the update, so here’s my TL;DR: -They added 19 challenge rooms to the path. -5 of those
Tweet card summary image
motasem-notes.net
The SOC Level 1 Path used to be one of the most popular journeys on TryHackMe. It taught thousands of newcomers how to investigate alerts
0
0
0
@ManMotasem
Motasem Hamdan
3 days
Seriously. I see so many creators with good traffic who are flat broke. Why? Because they're focusing on the wrong metric. You're not building a view-counter, you're building a business. Here's the lightbulb moment: What are you actually building? Authority: People trust your
0
0
0
@ManMotasem
Motasem Hamdan
3 days
https://t.co/hMvMUc0yNn As I promised yesterday, the full video breakdown of The Windows Update Hack is now out CVE-2025-59287 is an unauthenticated remote code execution flaw that allows attackers to send a single crafted cookie and get SYSTEM-level control over WSUS servers.
0
0
1
@ManMotasem
Motasem Hamdan
4 days
Imagine patching your network… and installing malware instead.T Hackers have been aexploiting a critical RCE in Microsoft WSUS , the very system that patches Windows.CVE-2025-59287 lets attackers run code as SYSTEM and even push fake updates across networks. I broke it down
Tweet card summary image
motasem-notes.net
In mid-October 2025 a dangerous unauthenticated remote-code-execution bug in Windows Server Update Services (WSUS) was disclosed and quickly weaponized.
0
0
0
@ManMotasem
Motasem Hamdan
4 days
Content Monetization in 2026 will not be about going viral. It’s going to be about system design. Creators who win today don’t chase algorithms , they build ecosystems. The old model is dead: You post → hope → wait In 2026, creators don’t depend on platforms. They design
0
0
0
@ManMotasem
Motasem Hamdan
5 days
https://t.co/46DNxr6yYN Active Directory is the backbone of every Windows domain , know the theory, then map it fast. I wrote a concise walkthrough of the Active Directory Basics room from the TryHackMe CompTIA Pentest+ path and boiled it down to the tactical things you
Tweet card summary image
motasem-notes.net
Microsoft's Active Directory is the backbone of the corporate world. It simplifies the management of devices and users within a corporate environment. In this room, we'll take a deep dive into the...
0
0
0
@ManMotasem
Motasem Hamdan
5 days
https://t.co/0ViA3YfbL8 I built multiple online brands from a single laptop , in cybersecurity, movies, gaming & marketing. Not from luck. From systems. From years of trial, failure, and consistency. → Cybersecurity: born from my time as a full-time analyst. → Movies &
Tweet card summary image
motasem-notes.net
I wanted to write, teach, and share what I loved , cybersecurity, storytelling, and the art of building online.
0
0
0
@ManMotasem
Motasem Hamdan
5 days
https://t.co/jv7lcqafLS Nmap isn’t just for port lists , it’s a toolkit for stealthy enumeration and IDS evasion. TryHackMe’s “Net Sec” challenge shows how Nmap + Hydra find hidden services, discover flags in HTTP/SSH headers, and even bypass IDS by probing non-standard ports
Tweet card summary image
motasem-notes.net
We used Nmap and Hydra to perform scanning and enumeration of services and credentials. We also used Nmap to bypass an intrusion detection system. This was as part of net sec challenge from Tryhackme.
0
0
0
@ManMotasem
Motasem Hamdan
6 days
https://t.co/iV1cK9qYKP Zeek turns raw packets into forensic, context-rich logs , perfect for NSM & incident response. Run it live on a tap/span for continuous visibility, or use zeek -C -r sample.pcap to analyze PCAPs offline , same engine, different mode. Monitor conn.log,
Tweet card summary image
motasem-notes.net
We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security monitoring, incident analysis and logs investigation.
0
0
0
@ManMotasem
Motasem Hamdan
7 days
https://t.co/UInRT4ID0K If you build or audit web auth, this short TryHackMe walkthrough is worth a read. It explains two practical JWT attack patterns you’ll see in CTFs , and sometimes in the wild: Learn two CTF-ready tricks attackers use: switching alg (RS256 → HS256) to
Tweet card summary image
motasem-notes.net
We covered JSON Web Tokens and its associated vulnerabilities. In JWT, the signature can be changed or the header to bypass authentication controls
0
0
0
@ManMotasem
Motasem Hamdan
8 days
https://t.co/3pt2R7ka6v New deep-dive: how hackers smuggle data out (DNS tunneling, rclone, cloud POSTs), what signals SOCs watch for, and a practical triage playbook you can use today. Look for: high-entropy DNS, weird TXT queries, large HTTP POSTs, suspicious PowerShell.
0
0
1
@ManMotasem
Motasem Hamdan
9 days
https://t.co/ltoWAvqsL6 Nessus is a vulnerability scanner built to find vulns precisely (won’t assume a web app lives on port 80 if it’s not there). Good GUI, many scan templates (host discovery, credentialed audits, web app tests). Useful for labs and real assessments when
Tweet card summary image
motasem-notes.net
Nessus vulnerability scanner , just like the name says , is built to do one thing really well: find vulnerabilities.
0
0
2
@ManMotasem
Motasem Hamdan
10 days
https://t.co/Iy24B9R45n Got a Mr. Robot–style Windows box? 🕵️‍♂️ I just finished a clean #TryHackMe Steel Mountain. Practical and compact lab for Windows privilege escalation. TL;DR: initial RCE on HttpFileServer 2.3 (port 8080) → netcat reverse shell as Bill → upgrade to
Tweet card summary image
motasem-notes.net
Break into a Mr. Robot–style Windows lab: gain initial foothold with Metasploit, probe the system with PowerShell to map privilege weaknesses
0
0
1
@ManMotasem
Motasem Hamdan
11 days
Finished TryHackMe’s Retro box , 3 ways to SYSTEM: WordPress creds → PHP shell RDP + CVE-2017-0213 kernel exploit UAC/cert UI trick that spawns SYSTEM IE (then cmd via Save dialog). Short writeup + commands here: https://t.co/C4lLwcgTOj #OSCP #TryHackMe #infosec
Tweet card summary image
motasem-notes.net
I tackled the "Retro" machine from TryHackMe, a Windows Server 2016 box which perfectly fits to be an OSCP prep material.
0
0
0
@ManMotasem
Motasem Hamdan
13 days
https://t.co/xHnSIxWG9M CCSP vs AWS Security Two cloud security certs. Two completely different career paths. CCSP = Multi-cloud strategy, architecture, leadership AWS Security = Hands-on defense in AWS CCSP → Architect, Consultant, CISO track AWS Security → Engineer,
0
0
0
@ManMotasem
Motasem Hamdan
14 days
Just dropped an article about Sigma language https://t.co/TNWRGjJa08 Most SOC analysts struggle to standardize detections across platforms. That’s where Sigma comes in , a YAML-based, open-source language that makes writing and sharing SIEM rules effortless. Sigma is an
Tweet card summary image
motasem-notes.net
In simple terms, Sigma gives analysts a universal language for detections, making it easier to share, adapt, and reuse detection logic across different SIEMs and tools.
0
0
0
@ManMotasem
Motasem Hamdan
16 days
https://t.co/HKNtT5yLXN They hacked Ticketmaster, breached Google, and sold half a billion user records on the dark web. You’ve probably never heard of them. They call themselves ShinyHunters. 👇 1️⃣ They don’t use ransomware. 2️⃣ They’ve hit brands like Google, LVMH,
0
0
2