Skip to content

The Cyber Chronicle

  • Home
  • About Me
  • Contact

Welcome to my Cybersecurity blog

Let’s dive into practical labs, share technical insights, and exchange detailed write-ups on our latest findings in cybersecurity. Whether it's exploring novel vulnerabilities, refining detection methods, or discussing advanced threat mitigation, there’s plenty for us to connect on.

Posts Categories

View All
Certifications
Certifications 1 post
Labs
Labs 4 posts
Tutorials
Tutorials 1 post
Write-ups
Write-ups 2 posts
Live Cyber Attacks Mapped ! An Azure Sentinel Honeypot Lab
15 min read 0
  • Labs

Live Cyber Attacks Mapped ! An Azure Sentinel Honeypot Lab

  • Chakib
  • October 7, 2024

In this lab, I'll walk you through the process of setting up a virtual machine…

Setting Up an Automated SOC Environment for Monitoring and Alerting with Wazuh, TheHive, and Shuffle
10 min read 0
  • Labs

Setting Up an Automated SOC Environment for Monitoring and Alerting with Wazuh, TheHive, and Shuffle

  • Chakib
  • October 3, 2024

As cyber threats continue to evolve in both frequency and complexity, security operations must adapt…

Setting Up Automated Incident Alerts and Instant Responses Using EDR and SOAR
7 min read 0
  • Labs

Setting Up Automated Incident Alerts and Instant Responses Using EDR and SOAR

  • Chakib
  • September 25, 2024

In today’s fast-paced digital landscape, cybersecurity threats evolve rapidly. To stay ahead of these threats,…

Sherlocks (forensic): discovery and solution of Brutus, a Hack the Box room
4 min read 0
  • Write-ups

Sherlocks (forensic): discovery and solution of Brutus, a Hack the Box room

  • Chakib
  • September 18, 2024

This is an interesting HackTheBox room, specifically from the Sherlock series. In this very easy…

SOC Analysis : Intro To Logs : a TryHackMe room
4 min read 0
  • Write-ups

SOC Analysis : Intro To Logs : a TryHackMe room

  • Chakib
  • September 15, 2024

Task 1: Logs as Evidence of Historical Activity The room starts by explaining why logs…

The Importance of Stabilizing a Shell (and How to Do It)
2 min read 0
  • Tutorials

The Importance of Stabilizing a Shell (and How to Do It)

  • Chakib
  • September 15, 2024

In penetration testing, getting a reverse shell is a key milestone—but the initial shell is…

How I Passed the AWS CCP in Just One Week
3 min read 0
  • Certifications

How I Passed the AWS CCP in Just One Week

  • Chakib
  • September 15, 2024

In today's rapidly evolving tech landscape, cloud computing is becoming a major cornerstone. For anyone…

My Thoughts on Wazuh: A Powerful Open-Source SIEM for Home Labs and Beyond
3 min read 0
  • Labs

My Thoughts on Wazuh: A Powerful Open-Source SIEM for Home Labs and Beyond

  • Chakib
  • September 14, 2024

Wazuh is a relatively new player in the Security Information and Event Management (SIEM) space,…

Copyright © 2025 The Cyber Chronicle Theme: Blooming Blog By Adore Themes.