Published inInfoSec Write-upsFalconEye: Splunk Threat HuntingThis article provides my approach for solving the FalconEye blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 16, 2023Jul 16, 2023
Published inInfoSec Write-upsQRadar Threat Hunting: Blue Team CTF ChallengeThis article provides my approach for solving the Qradar101 blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 2, 2023Jul 2, 2023
Published inInfoSec Write-upsPMAT — Bonus Ransomware BinaryThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 15, 2023Apr 15, 2023
Published inInfoSec Write-upsPMAT — Bonus Malware Lab WriteupThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 10, 2023Apr 10, 2023
Splunk Core Certified Power User (SPLK-1002) : Certification ExperienceIntroductionJan 28, 2023Jan 28, 2023
Splunk Core Certified User (SPLK-1001) : Certification ExperienceIntroductionDec 24, 20222Dec 24, 20222
Published inInfoSec Write-upsS3 Bucket: Cloud Trail Log AnalysisThis article provides my approach for solving the Bucket CTF challenge created by Scott Piper on the CyberDefenders website, a blue…Aug 31, 2022Aug 31, 2022
Published inInfoSec Write-upsCyber Security Detection FrameworksIf you spend enough time in or around the cyber security industry, you will often hear the term “cyber security framework” mentioned. In…Aug 1, 20222Aug 1, 20222
Published inInfoSec Write-upsPivoting Techniques with THM WreathIn this article, I will be covering some basic pivoting methods that can be used to access networks we would normally not have access to…Jul 24, 2022Jul 24, 2022
Published inInfoSec Write-upsHackTheBox Writeup: RouterSpaceThis was an easy-difficulty Linux box that required basic scanning and analysis of an Android APK file to gain a foothold on the machine to…Jul 9, 2022Jul 9, 2022
Published inInfoSec Write-upsDNS in Active DirectoryThis article provides a basic overview of how the Domain Name System (DNS) protocol works. In this article, we will explore the basic…Jul 3, 2022Jul 3, 2022
Published inInfoSec Write-upsHacktheBox Writeup: PaperThis was an easy-difficulty Linux box that required basic scanning and enumeration to gain a foothold on the machine and get the user flag…Jun 21, 2022Jun 21, 2022