Published inInfoSec Write-upsSANS 2022 Holiday Hack Challenge & KringleConPCAP file & Windows event logs investigationJan 15, 2023Jan 15, 2023
Published inInfoSec Write-upsPerforming Security Gap Analysis using Breach & Attack Simulation (BAS) ToolsContinuous Testing and Auditing - Purple Teaming ActivityDec 24, 2022Dec 24, 2022
CISSP Domain 3 Notes - Security Architecture and EngineeringStudy Guide 9th editionDec 19, 2022Dec 19, 2022
Published inInfoSec Write-upsUsing Threat Intelligence data to generate MISP alertsThere are various Threat Intelligence sources that shares threat information with each other to help identify those threats in their…Dec 15, 2022Dec 15, 2022
Published inInfoSec Write-upsOperationalizing MITRE ATT&CK to harden cyber defensesTake Adversary’s perspective in Defender’s TeamDec 9, 2022Dec 9, 2022
Published inInfoSec Write-upsHTB Time [writeup]Exploiting the RCE and SSRF VulnerabilitiesDec 5, 2022Dec 5, 2022
Published inInfoSec Write-upsHTB Omni [writeup]Exploiting Windows IoT Core using SireRATNov 18, 2022Nov 18, 2022
Published inInfoSec Write-upsFine-Tune Security Alerts & OptimisationBlue Team SOC ActivityNov 16, 2022Nov 16, 2022