Feb 12 · 5 min read · Introduction You were hired as a SOC Analyst for one of the biggest Juice Shops in the world and an attacker has made their way into your network. Your tasks are: Figure out what techniques and tools the attacker used What endpoints were vulnerable...
Join discussion
Jan 23 · 4 min read · Room Link: https://tryhackme.com/room/mastermindsxlq Objectives: Log analysis using Brim Identifying suspicious domains and IP addresses Threat intelligence analysis Identifying malware types based on downloaded executables Task 1: Detect the c...
Join discussion
Oct 28, 2025 · 14 min read · Linux remains at the core of modern computing — from cloud environments and IoT devices to enterprise servers powering the world’s infrastructure. As organizations increasingly adopt AI, automation, and distributed architectures, Linux systems have b...
Join discussion
Oct 20, 2025 · 8 min read · Sysmon is a Windows system monitoring tool that logs detailed events like process creation, network connections, file changes, DLL loads, and registry modifications into Windows Event Logs for threat hunting and forensics. Sysmon don’t collect every...
Join discussion
Sep 12, 2025 · 15 min read · The web is one of the most exposed entry points for attackers, making web applications a frequent target in modern security incidents. From client-side exploits that trick users into compromising their own devices to server-side attacks that directly...
Join discussion
Jul 10, 2025 · 3 min read · Whether you're starting with Linux or diving deeper into DevOps workflows, this guide walks you through real-world, hands-on tasks for managing users, permissions, and analyzing logs — all essentials for DevOps engineers. 1️⃣ User & Group Management ...
Join discussionJan 11, 2025 · 10 min read · In this article, we’ll cover Log analysis - He analyzed and analyzed till his analyzer was sore! write-up as the Day 17 challenge of the Advent of Cyber event challenge. It involved navigating the Splunk Enterprise and filtering the different events ...
Join discussion
Jan 11, 2025 · 1 min read · In this article, we’ll cover the Log Analysis. Even if I wanted to go, their vulnerabilities wouldn't allow me to write up the log analysis as the Day 3 challenge of the Advent of Cyber event challenge. It was interesting to navigate the Elastic Sear...
Join discussion
Dec 5, 2024 · 2 min read · In this article, we’ll cover the Log Analysis—One Man's False Positive is Another Man's Potpourri writeup as the Day 2 challenge of the Advent of Cyber event challenge. It was interesting to navigate the platform and filter different events and logs ...
Join discussion