K O M A LinInfoSec Write-upsSANS 2022 Holiday Hack Challenge & KringleConPCAP file & Windows event logs investigationJan 15, 2023Jan 15, 2023
K O M A LinInfoSec Write-upsPerforming Security Gap Analysis using Breach & Attack Simulation (BAS) ToolsContinuous Testing and Auditing - Purple Teaming ActivityDec 24, 2022Dec 24, 2022
K O M A LCISSP Domain 3 Notes - Security Architecture and EngineeringStudy Guide 9th editionDec 19, 2022Dec 19, 2022
K O M A LinInfoSec Write-upsUsing Threat Intelligence data to generate MISP alertsThere are various Threat Intelligence sources that shares threat information with each other to help identify those threats in their…Dec 15, 2022Dec 15, 2022
K O M A LinInfoSec Write-upsOperationalizing MITRE ATT&CK to harden cyber defensesTake Adversary’s perspective in Defender’s TeamDec 9, 2022Dec 9, 2022
K O M A LinInfoSec Write-upsHTB Time [writeup]Exploiting the RCE and SSRF VulnerabilitiesDec 5, 2022Dec 5, 2022
K O M A LinInfoSec Write-upsHTB Omni [writeup]Exploiting Windows IoT Core using SireRATNov 18, 2022Nov 18, 2022
K O M A LinInfoSec Write-upsFine-Tune Security Alerts & OptimisationBlue Team SOC ActivityNov 16, 2022Nov 16, 2022