top of page
Blog
Search

2 days ago12 min read
Automating Response #SOAR #EDR - Building an Interactive Slack App (Bonus Section)
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
3 views0 comments

2 days ago8 min read
Automating Response #SOAR #EDR - The SOAR (Tines) Playbook - Part B
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
2 views0 comments

2 days ago8 min read
Automating Response #SOAR #EDR - The SOAR (Tines) Playbook - Part A
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
2 views0 comments

2 days ago4 min read
Automating Response #SOAR #EDR - Tines and Slack Integration
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
2 views0 comments

2 days ago8 min read
Automating Response #SOAR #EDR - LimaCharlie Setup
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
6 views0 comments

Feb 95 min read
How to Ace the GCIH
SEC504 the GCIH Exam: Insights and Preparation In my last certification review post back in November 2024, found here:...
305 views2 comments


Jan 223 min read
Streamlining Incident Response: Using PowerShell to Compare Baselines and Detect IoCs
How PowerShell Can Fast-Track Your Security Incident Investigations In cybersecurity, the ability to quickly identify deviations from a...
31 views0 comments

Nov 26, 20248 min read
How to ACE the GIAC Certified Forensic Examiner (GCFE) Exam
Taking on FOR500 and sitting the GCFE Exam: Insights and Preparation It's been a minute since I last made a blog post, but as you can see...
396 views0 comments

Oct 28, 20244 min read
Unlocking the Windows Registry: A Hidden Goldmine for Cyber Threat Detection 🔒🛡️
A guide to Detecting and Mitigating Registry-Based Persistence Mechanisms The Windows Registry is often an underutilized asset in the...
41 views0 comments


Oct 20, 20248 min read
Building a File Integrity Monitoring Tool with PowerShell
Introduction Hey everyone! 👋 I'm excited to share a project I've been working on that's both a fun challenge and a crucial tool in...
67 views0 comments

Oct 14, 202411 min read
Microsoft Sentinel Detection Lab
Welcome to the Microsoft Sentinel and Honey pot detection lab. Please note that this lab includes troubleshooting steps I had to do along...
73 views0 comments


Mar 13, 20234 min read
Investigating Let's Defend Alert SOC146
How do Security Analyst investigate alerts? Well, it can vary. However, I will be going through an investigation methodology which...
293 views0 comments


Mar 12, 20237 min read
Cybersecurity Home Lab - Splunk logs and Troubleshooting
Part 6b- Ingesting logs in Splunk (Troubleshooting & Network Migration) Part 1- Configuring pfsense Part 2- Configure Security Onions IDS...
706 views0 comments


Mar 12, 20232 min read
Cybersecurity Home Lab - Ingesting logs in Splunk
Ingesting logs in Splunk Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part...
510 views0 comments


Mar 12, 20232 min read
Cybersecurity Home Lab - Deploying Splunk
Installing Splunk on an Ubuntu Server Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim...
571 views0 comments


Feb 25, 20234 min read
Cybersecurity Home Lab - Going hybrid using Azure AD connect
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
635 views0 comments


Feb 25, 20235 min read
Cybersecurity Home Lab - Active Directory Deployment
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
933 views0 comments

Feb 22, 20234 min read
Cybersecurity Home Lab - Configuring Security Onion IDS
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
1,623 views0 comments


Feb 20, 20236 min read
Cybersecurity Home Lab - Configuring Pfsense Firewall
Part 1- Configuring pfsense Part 2- Configure Security Onions IDS Part 3- Building AD Lab (Victim Domain) Part 4- Going hybrid -...
9,454 views1 comment

Feb 15, 20232 min read
Blue Team Level 1 - Review
In this blog post I will briefly go over my experiencing preparing and sitting the BTL1 exam. BTL1 is a practical defensive certification...
338 views0 comments
bottom of page