In this lab, I'll walk you through the process of setting up a virtual machine…
Posts Categories
10 min read
0
Setting Up an Automated SOC Environment for Monitoring and Alerting with Wazuh, TheHive, and Shuffle
As cyber threats continue to evolve in both frequency and complexity, security operations must adapt…
7 min read
0
Setting Up Automated Incident Alerts and Instant Responses Using EDR and SOAR
In today’s fast-paced digital landscape, cybersecurity threats evolve rapidly. To stay ahead of these threats,…
4 min read
0
Sherlocks (forensic): discovery and solution of Brutus, a Hack the Box room
This is an interesting HackTheBox room, specifically from the Sherlock series. In this very easy…
4 min read
0
SOC Analysis : Intro To Logs : a TryHackMe room
Task 1: Logs as Evidence of Historical Activity The room starts by explaining why logs…
2 min read
0
The Importance of Stabilizing a Shell (and How to Do It)
In penetration testing, getting a reverse shell is a key milestone—but the initial shell is…
3 min read
0
How I Passed the AWS CCP in Just One Week
In today's rapidly evolving tech landscape, cloud computing is becoming a major cornerstone. For anyone…
3 min read
0
My Thoughts on Wazuh: A Powerful Open-Source SIEM for Home Labs and Beyond
Wazuh is a relatively new player in the Security Information and Event Management (SIEM) space,…