top of page
Blog
Search


Building a Web Scraper with Python
I've been working on my Python skills for Cybersecurity, taking on various projects that expose me to various facets of Python that would...
6 days ago11 min read
469 views
0 comments

Building a Port Scanner with Python
One of my goals for this year was to work on improving my programming skills. The way I have been approaching this is by revisiting...
Mar 93 min read
44 views
0 comments

Automating Response #SOAR #EDR - Building an Interactive Slack App (Bonus Section)
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 2512 min read
4 views
0 comments

Automating Response #SOAR #EDR - The SOAR (Tines) Playbook - Part B
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read
6 views
0 comments

Automating Response #SOAR #EDR - The SOAR (Tines) Playbook - Part A
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read
7 views
0 comments

Automating Response #SOAR #EDR - Tines and Slack Integration
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 254 min read
3 views
0 comments

Automating Response #SOAR #EDR - LimaCharlie Setup
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read
14 views
0 comments

How to Ace the GCIH
SEC504 the GCIH Exam: Insights and Preparation In my last certification review post back in November 2024, found here:...
Feb 95 min read
371 views
2 comments


Streamlining Incident Response: Using PowerShell to Compare Baselines and Detect IoCs
How PowerShell Can Fast-Track Your Security Incident Investigations In cybersecurity, the ability to quickly identify deviations from a...
Jan 223 min read
31 views
0 comments

How to ACE the GIAC Certified Forensic Examiner (GCFE) Exam
Taking on FOR500 and sitting the GCFE Exam: Insights and Preparation It's been a minute since I last made a blog post, but as you can see...
Nov 26, 20248 min read
467 views
0 comments

Unlocking the Windows Registry: A Hidden Goldmine for Cyber Threat Detection 🔒🛡️
A guide to Detecting and Mitigating Registry-Based Persistence Mechanisms The Windows Registry is often an underutilized asset in the...
Oct 28, 20244 min read
55 views
0 comments


Building a File Integrity Monitoring Tool with PowerShell
Introduction Hey everyone! 👋 I'm excited to share a project I've been working on that's both a fun challenge and a crucial tool in...
Oct 20, 20248 min read
71 views
0 comments

Microsoft Sentinel Detection Lab
Welcome to the Microsoft Sentinel and Honey pot detection lab. Please note that this lab includes troubleshooting steps I had to do along...
Oct 14, 202411 min read
76 views
0 comments


Investigating Let's Defend Alert SOC146
How do Security Analyst investigate alerts? Well, it can vary. However, I will be going through an investigation methodology which...
Mar 13, 20234 min read
300 views
0 comments


Cybersecurity Home Lab - Splunk logs and Troubleshooting
Part 6b- Ingesting logs in Splunk (Troubleshooting & Network Migration) Part 1- Configuring pfsense Part 2- Configure Security Onions IDS...
Mar 12, 20237 min read
710 views
0 comments


Cybersecurity Home Lab - Ingesting logs in Splunk
Ingesting logs in Splunk Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part...
Mar 12, 20232 min read
517 views
0 comments


Cybersecurity Home Lab - Deploying Splunk
Installing Splunk on an Ubuntu Server Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim...
Mar 12, 20232 min read
576 views
0 comments


Cybersecurity Home Lab - Going hybrid using Azure AD connect
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
Feb 25, 20234 min read
641 views
0 comments


Cybersecurity Home Lab - Active Directory Deployment
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
Feb 25, 20235 min read
944 views
0 comments

Cybersecurity Home Lab - Configuring Security Onion IDS
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
Feb 22, 20234 min read
1,664 views
0 comments
bottom of page