PinnedSetting Up Wazuh Home Lab: Part 1 — Preparing the EnvironmentIn today’s rapidly evolving digital landscape, the importance of robust cybersecurity measures cannot be overstated. Every day, businesses…Jul 9, 2024Jul 9, 2024
Detecting and Analyzing Brute Force Attack Detection and Mitigation Using Fail2Ban and HydraIn today’s world, where cybersecurity threats are increasing rapidly, brute force attacks are one of the most common ways for attackers to…Jan 5Jan 5
Log analysis with Sysmon- WalkthroIn this post, I’ll walk you through an engaging challenge I recently tackled on LetsDefend, a platform that hones cybersecurity skills…Nov 22, 2024Nov 22, 2024
Memory Analysis- WIn this post, I’ll be walking you through a fascinating challenge I recently worked on via LetsDefend, a platform that sharpens…Nov 22, 2024Nov 22, 2024
Malicious VBA- WalkthroughIn this post, I’ll be walking you through an exciting challenge I tackled on LetsDefend, a platform designed to improve cybersecurity…Nov 22, 2024Nov 22, 2024
Kernel Exploit- WalkthroughIn this blog, we delve into the investigation of a Linux kernel exploit that led to a security breach on a critical transaction processing…Nov 21, 2024Nov 21, 2024
Investigate Web Attack — WalkthroughIn this post, I’ll be walking you through an exciting challenge I tackled on LetsDefend, a platform designed to improve cybersecurity…Nov 11, 2024Nov 11, 2024
Building an Active Directory LabIn this blog, I’ll walk you through the process of setting up an Active Directory lab environment, featuring tools like Splunk, Kali Linux…Oct 21, 2024Oct 21, 2024
Building a SIEM Home Lab with Elastic and Kali VMIn today’s digital landscape, the ability to analyze and respond to security incidents is crucial for any cybersecurity professional. This…Sep 25, 2024Sep 25, 2024
Setting Up Wazuh Home Lab: Part 3 — File Integrity Monitoring (FIM)In this part, we will explore the implementation of File Integrity Monitoring (FIM) using Wazuh. FIM is a crucial aspect of security…Sep 22, 2024Sep 22, 2024