top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![Incident Response Framework](https://static.wixstatic.com/media/5fb032_6f57ca70566c408b9742ab7901fd1bd7~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_6f57ca70566c408b9742ab7901fd1bd7~mv2.webp)
-
Jan 2, 20241 min read
Incident Response Framework
In Next few posts, I am going Delve deep in incident response and various aspects. Incident Response Procedures: Procedures and...
33 views0 comments
![](https://static.wixstatic.com/media/5fb032_79a8561593cb4b4f95e6df707888904b~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_79a8561593cb4b4f95e6df707888904b~mv2.webp)
![Welcoming the New Year with Hope and Joy](https://static.wixstatic.com/media/5fb032_79a8561593cb4b4f95e6df707888904b~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_79a8561593cb4b4f95e6df707888904b~mv2.webp)
-
Jan 1, 20241 min read
Welcoming the New Year with Hope and Joy
As the clock strikes midnight, we bid farewell to the past year and warmly welcome the promising dawn of a new one. The New Year...
3 views0 comments
![Celebrate the Holiday Season with Joy and Gratitude](https://static.wixstatic.com/media/5fb032_80809a588ed848e3ad1e7c9ca271d55e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_80809a588ed848e3ad1e7c9ca271d55e~mv2.webp)
-
Dec 24, 20231 min read
Celebrate the Holiday Season with Joy and Gratitude
Tis the season to be jolly! As the year draws to a close, we find ourselves surrounded by the warmth of cheerful decorations, the...
27 views0 comments
![Understanding Lateral Movement in Cyber Attacks:](https://static.wixstatic.com/media/5fb032_47112c8d213f49ce980adc6f1db6e926~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_47112c8d213f49ce980adc6f1db6e926~mv2.webp)
-
Dec 20, 20233 min read
Understanding Lateral Movement in Cyber Attacks:
In the realm of cybersecurity, one of the most concerning aspects of an attack campaign is the stealthy progression through a network to...
180 views0 comments
![Unveiling the Threat of Golden Ticket Attacks](https://static.wixstatic.com/media/5fb032_9d20a3b98ab044bba6f1feeecdc4bd7d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_9d20a3b98ab044bba6f1feeecdc4bd7d~mv2.webp)
-
Dec 18, 20232 min read
Unveiling the Threat of Golden Ticket Attacks
"Golden Ticket" attack perform on Active Directory environments. This technique, a perilous offspring of pass-the-hash attacks(Local...
42 views0 comments
![Understanding Pass the Hash Attacks and Mitigation](https://static.wixstatic.com/media/5fb032_42efef6344924f38ba55c3f937b3d176~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_42efef6344924f38ba55c3f937b3d176~mv2.webp)
-
Dec 17, 20232 min read
Understanding Pass the Hash Attacks and Mitigation
In the world of cybersecurity, malicious actors are constantly evolving their tactics to breach systems and gain unauthorized access. One...
50 views0 comments
![Understanding Key Concepts in URL Analysis, HTTP Methods, and Response Codes in Cybersecurity](https://static.wixstatic.com/media/5fb032_606f6765a5cb49ce8cd440584f9c0913~mv2.png/v1/fill/w_346,h_120,fp_0.50_0.50,q_95,enc_auto/5fb032_606f6765a5cb49ce8cd440584f9c0913~mv2.webp)
-
Dec 15, 20232 min read
Understanding Key Concepts in URL Analysis, HTTP Methods, and Response Codes in Cybersecurity
In the realm of cybersecurity, the examination of URLs and the comprehension of HTTP methods and response codes play a pivotal role in...
32 views0 comments
![Suricata configurations Part 4](https://static.wixstatic.com/media/5fb032_601b7e07dea248b3a4b8d210ebc0dfe7~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_601b7e07dea248b3a4b8d210ebc0dfe7~mv2.webp)
-
Dec 14, 20232 min read
Suricata configurations Part 4
Configuration Steps 1. Rules Configuration Suricata comes with default rules, but you can add custom rules by specifying their locations....
21 views0 comments
![Suricata Configuration Part 3](https://static.wixstatic.com/media/5fb032_0976fb7643734e828ac0941c75bd6ee1~mv2.png/v1/fill/w_363,h_281,fp_0.50_0.50,q_95,enc_auto/5fb032_0976fb7643734e828ac0941c75bd6ee1~mv2.webp)
-
Dec 13, 20232 min read
Suricata Configuration Part 3
Understanding Suricata's Configuration Structure Suricata's configuration resides in YAML format, offering a streamlined and intuitive...
27 views0 comments
![How to Download and Start Suricata Part 2](https://static.wixstatic.com/media/5fb032_69e4f8b025314042b0454ad43c19e4a1~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_69e4f8b025314042b0454ad43c19e4a1~mv2.webp)
-
Dec 11, 20231 min read
How to Download and Start Suricata Part 2
Any OS can be used. But in this case I am using ubuntu. (Later in future I will share blog about how to run in windows as well. History...
17 views0 comments
![Exploring Suricata: Part 1](https://static.wixstatic.com/media/5fb032_c0dd0756c86d4a0db58e122b1f139f93~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_c0dd0756c86d4a0db58e122b1f139f93~mv2.webp)
-
Dec 10, 20231 min read
Exploring Suricata: Part 1
In this guide, I'll delve into the world of Suricata, covering its installation, configuration, and its prowess as a robust intrusion...
23 views0 comments
-
Dec 9, 20232 min read
Understanding IP, DNS Analysis, and Strategies to Combat Evolving Threats
The landscape of cyber threats is continually evolving, and attackers are employing sophisticated techniques to circumvent traditional...
12 views0 comments
![Unveiling the Power of CentralOps](https://static.wixstatic.com/media/5fb032_92e4a417cfa44cc791c4f793c0151ec1~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_92e4a417cfa44cc791c4f793c0151ec1~mv2.webp)
-
Dec 8, 20231 min read
Unveiling the Power of CentralOps
"In a world where data is king, CentralOps stood as a beacon, offering a treasure trove of internet-related information at users'...
32 views0 comments
-
Dec 7, 20231 min read
The Art of Threat Hunting
"Remember, the best defense is often a proactive offense - and that's where threat hunting shines." In the dynamic landscape of...
10 views0 comments
![Network Scanning with Nmap](https://static.wixstatic.com/media/5fb032_d1c5da57aaee44d4aa86c3673b2679e1~mv2.png/v1/fill/w_400,h_202,fp_0.50_0.50,q_95,enc_auto/5fb032_d1c5da57aaee44d4aa86c3673b2679e1~mv2.webp)
-
Dec 5, 20231 min read
Network Scanning with Nmap
Nmap, short for Network Mapper, is an open-source network scanning tool developed by Gordon Lyon. Since its inception in September 1997,...
15 views0 comments
![Unveiling Volatility 3: A Guide to Installation and Memory Analysis on Windows and WSL](https://static.wixstatic.com/media/5fb032_cc145e9d8b954153a50fc4a26bd097a4~mv2.png/v1/fill/w_394,h_172,fp_0.50_0.50,q_95,enc_auto/5fb032_cc145e9d8b954153a50fc4a26bd097a4~mv2.webp)
-
Dec 3, 20234 min read
Unveiling Volatility 3: A Guide to Installation and Memory Analysis on Windows and WSL
Today, let's dive into the fascinating world of digital forensics by exploring Volatility 3 —a powerful framework used for extracting...
166 views0 comments
![](https://static.wixstatic.com/media/5fb032_f9f0b40fa1274d659bbf7567fab06ce0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_f9f0b40fa1274d659bbf7567fab06ce0~mv2.webp)
![Embracing life's adventures](https://static.wixstatic.com/media/5fb032_f9f0b40fa1274d659bbf7567fab06ce0~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_f9f0b40fa1274d659bbf7567fab06ce0~mv2.webp)
-
Dec 2, 20231 min read
Embracing life's adventures
Travelling, exploring new places, and immersing oneself in diverse experience is not just an escape; its a pathway to rejuvenation....
18 views0 comments
-
Nov 28, 20232 min read
Understanding Threat Research
In today's hyper-connected digital landscape, the battle between cybersecurity professionals and threat actors continues to escalate....
10 views0 comments
-
Nov 27, 20232 min read
Microsoft's Log Parser : (BONUS File included)
Microsoft's Log Parser is a powerful command-line utility that can streamline this process, providing efficient querying capabilities to...
166 views0 comments
-
Nov 26, 20231 min read
Open-Source Threat Intelligence for Enhanced Cybersecurity
Knowledge is power, and access to robust threat intelligence is pivotal in fortifying defenses against an array of cyber threats.....
14 views0 comments
bottom of page