Memuat Detail Pengguna

Mengambil data dari API TryHackMe...

Mohon tunggu sebentar, proses ini mungkin memakan waktu beberapa detik

Detail Pengguna: aerysh

Avatar

Ahmad Azwar Annas

Rank: 27125

Poin: None

Room Selesai: 156

Badge: 40

Negara: ID

Streak: 0

Aktivitas Harian

Badges

Gambar Badge Judul
First Step into SOC First Step into SOC
SOC Apprentice SOC Apprentice
First alert closed First alert closed
First scenario completed First scenario completed
100% true positive rate 100% true positive rate
Defensive Toolsmith Defensive Toolsmith
Skilled Navigator Skilled Navigator
Phish Hunter Phish Hunter
Wireshark Wireshark
Bronze League Bronze League

Room yang Telah Diselesaikan

Gambar Nama Room Kesulitan Tipe
Room Image Welcome Easy Walkthrough
Room Image MITRE Medium Walkthrough
Room Image Linux Fundamentals Part 1 Info Walkthrough
Room Image Linux Fundamentals Part 2 Info Walkthrough
Room Image Linux Fundamentals Part 3 Info Walkthrough
Room Image Phishing Analysis Fundamentals Easy Walkthrough
Room Image Phishing Analysis Tools Easy Walkthrough
Room Image Phishing Emails in Action Easy Walkthrough
Room Image Junior Security Analyst Intro Easy Walkthrough
Room Image Phishing Prevention Easy Walkthrough
Room Image Pyramid Of Pain Easy Walkthrough
Room Image The Greenholt Phish Easy Challenge
Room Image Cyber Kill Chain Easy Walkthrough
Room Image Snort Medium Walkthrough
Room Image Intro to Malware Analysis Medium Walkthrough
Room Image NetworkMiner Easy Walkthrough
Room Image Introduction to DevSecOps Medium Walkthrough
Room Image Elastic Stack: The Basics Medium Walkthrough
Room Image Unified Kill Chain Easy Walkthrough
Room Image ItsyBitsy Medium Challenge
Room Image Benign Medium Challenge
Room Image SSDLC Medium Walkthrough
Room Image Wireshark: The Basics Easy Walkthrough
Room Image Intro to Cyber Threat Intel Easy Walkthrough
Room Image Wireshark: Packet Operations Easy Walkthrough
Room Image Introduction to SIEM Easy Walkthrough
Room Image Tempest Medium Challenge
Room Image Microsoft Windows Hardening Easy Walkthrough
Room Image Security Principles Easy Walkthrough
Room Image Wireshark: Traffic Analysis Medium Walkthrough
Room Image Secure Network Architecture Medium Walkthrough
Room Image Active Directory Hardening Medium Walkthrough
Room Image Introduction to Cryptography Medium Walkthrough
Room Image Network Security Protocols Medium Walkthrough
Room Image OWASP API Security Top 10 - 2 Medium Walkthrough
Room Image OWASP API Security Top 10 - 1 Medium Walkthrough
Room Image Introduction to SOAR Medium Walkthrough
Room Image Splunk: The Basics Easy Walkthrough
Room Image Intro to Cloud Security Easy Walkthrough
Room Image Linux System Hardening Medium Walkthrough
Room Image Virtualization and Containers Easy Walkthrough
Room Image Boogeyman 1 Medium Walkthrough
Room Image Vulnerability Management Medium Walkthrough
Room Image DAST Medium Walkthrough
Room Image Weaponizing Vulnerabilities Medium Walkthrough
Room Image Snapped Phish-ing Line Easy Challenge
Room Image Identity and Access Management Easy Walkthrough
Room Image Network Device Hardening Medium Walkthrough
Room Image Threat Modelling Medium Walkthrough
Room Image Governance & Regulation Easy Walkthrough
Room Image Mother's Secret Easy Challenge
Room Image Security Engineer Intro Easy Walkthrough
Room Image SAST Medium Walkthrough
Room Image Risk Management Easy Walkthrough
Room Image Logging for Accountability Easy Walkthrough
Room Image Traverse Easy Walkthrough
Room Image Auditing and Monitoring Easy Walkthrough
Room Image Intro to IR and IM Easy Walkthrough
Room Image Becoming a First Responder Info Walkthrough
Room Image Cyber Crisis Management Easy Walkthrough
Room Image Boogeyman 2 Medium Challenge
Room Image Boogeyman 3 Medium Challenge
Room Image Eviction Easy Walkthrough
Room Image Summit Easy Challenge
Room Image IDS Fundamentals Easy Walkthrough
Room Image SOC L1 Alert Triage Easy Walkthrough
Room Image SOC L1 Alert Reporting Easy Walkthrough
Room Image SOC Workbooks and Lookups Easy Walkthrough
Room Image SOC Metrics and Objectives Easy Walkthrough
Room Image Windows Logging for SOC Easy Walkthrough
Room Image Windows Threat Detection 1 Medium Walkthrough
Room Image Windows Threat Detection 2 Medium Walkthrough
Room Image Detecting Web Shells Easy Walkthrough
Room Image File and Hash Threat Intel Easy Walkthrough
Room Image Windows Threat Detection 3 Medium Walkthrough
Room Image Humans as Attack Vectors Easy Walkthrough
Room Image Systems as Attack Vectors Easy Walkthrough
Room Image Log Analysis with SIEM Medium Walkthrough
Room Image SOC Role in Blue Team Easy Walkthrough
Room Image Web Security Essentials Easy Walkthrough
Room Image Network Discovery Detection Medium Walkthrough
Room Image Linux Logging for SOC Easy Walkthrough
Room Image IP and Domain Threat Intel Medium Walkthrough
Room Image Invite Only Easy Challenge
Room Image Detecting Web Attacks Easy Walkthrough
Room Image Man-in-the-Middle Detection Easy Walkthrough
Room Image Linux Threat Detection 1 Medium Walkthrough
Room Image Malware Classification Easy Walkthrough
Room Image Alert Triage With Splunk Medium Walkthrough
Room Image Introduction to EDR Easy Walkthrough
Room Image Network Security Essentials Easy Walkthrough
Room Image Detecting Web DDoS Easy Walkthrough
Room Image Linux Threat Detection 2 Medium Walkthrough
Room Image Shadow Trace Easy Challenge
Room Image Linux Threat Detection 3 Medium Walkthrough
Room Image Alert Triage With Elastic Medium Walkthrough
Room Image Network Traffic Basics Easy Walkthrough
Room Image Data Exfiltration Detection Medium Walkthrough
Room Image Living Off the Land Attacks Easy Walkthrough
Room Image OWASP Top 10 2025: IAAA Failures Easy Walkthrough
Room Image Walking An Application Easy Walkthrough
Room Image Pentesting Fundamentals Easy Walkthrough
Room Image Principles of Security Info Walkthrough
Room Image Content Discovery Easy Walkthrough
Room Image Windows Internals Medium Walkthrough
Room Image Offensive Security Intro Easy Walkthrough
Room Image Defensive Security Intro Easy Walkthrough
Room Image Tardigrade Medium Walkthrough
Room Image Careers in Cyber Info Walkthrough
Room Image Dissecting PE Headers Medium Walkthrough
Room Image Sigma Medium Walkthrough
Room Image x86 Architecture Overview Easy Walkthrough
Room Image x86 Assembly Crash Course Medium Walkthrough
Room Image Intro to Detection Engineering Easy Walkthrough
Room Image Aurora EDR Medium Walkthrough
Room Image Tactical Detection Medium Walkthrough
Room Image SigHunt Medium Challenge
Room Image Basic Static Analysis Medium Walkthrough
Room Image MalBuster Medium Walkthrough
Room Image Splunk: Exploring SPL Medium Walkthrough
Room Image Threat Intelligence for SOC Medium Walkthrough
Room Image Basic Dynamic Analysis Medium Walkthrough
Room Image Atomic Red Team Medium Walkthrough
Room Image Intro to Threat Emulation Medium Walkthrough
Room Image Splunk: Setting up a SOC Lab Medium Walkthrough
Room Image Anti-Reverse Engineering Medium Walkthrough
Room Image Dynamic Analysis: Debugging Medium Walkthrough
Room Image CALDERA Hard Walkthrough
Room Image Advanced Static Analysis Medium Walkthrough
Room Image MalDoc: Static Analysis Medium Walkthrough
Room Image Advanced ELK Queries Easy Walkthrough
Room Image Intro to Logs Easy Walkthrough
Room Image Preparation Medium Walkthrough
Room Image Threat Intel & Containment Easy Walkthrough
Room Image Logstash: Data Processing Unit Medium Walkthrough
Room Image Threat Hunting: Foothold Medium Walkthrough
Room Image Threat Hunting: Pivoting Medium Walkthrough
Room Image Custom Alert Rules in Wazuh Easy Walkthrough
Room Image Splunk: Dashboards and Reports Easy Walkthrough
Room Image Threat Hunting: Introduction Easy Walkthrough
Room Image Splunk: Data Manipulation Medium Walkthrough
Room Image Slingshot Easy Walkthrough
Room Image Threat Hunting: Endgame Medium Walkthrough
Room Image Intro to Log Analysis Easy Walkthrough
Room Image Identification & Scoping Medium Walkthrough
Room Image Atomic Bird Goes Purple #1 Medium Walkthrough
Room Image Atomic Bird Goes Purple #2 Medium Walkthrough
Room Image Eradication & Remediation Easy Walkthrough
Room Image Lessons Learned Easy Walkthrough
Room Image Log Operations Easy Walkthrough
Room Image Hunt Me I: Payment Collectors Medium Walkthrough
Room Image Fixit Medium Walkthrough
Room Image Hunt Me II: Typo Squatters Medium Walkthrough
Room Image OWASP Top 10 2025: Application Design Flaws Easy Walkthrough
Room Image OWASP Top 10 2025: Insecure Data Handling Easy Walkthrough
Room Image Offensive Security Intro Easy Walkthrough
Kembali ke Dashboard