Building Practical SIEM Dashboards in Elastic
Overview I’ve been blessed to be extremely busy the first few months of this new year, both professionally and personally. […]
Building Practical SIEM Dashboards in Elastic Read Post »
Overview I’ve been blessed to be extremely busy the first few months of this new year, both professionally and personally. […]
Building Practical SIEM Dashboards in Elastic Read Post »
Overview To stay current with detection and response skills, I’ve started working through the Hack the Box SOC Analyst Pathway.
Incident Handling: From Preparation to Detection & Analysis Read Post »
Expanding the Investigation In Part One, the focus was on quickly identifying attacker tooling and vulnerable endpoints using a lightweight
TryHackMe – Juicy Details Challenge: Log Analysis with Python – Part Two Read Post »
Investigation Approach This TryHackMe challenge was a great opportunity to practice log analysis while also reinforcing what I’ve been learning
TryHackMe – Juicy Details Challenge: Log Analysis with Python – Part One Read Post »
Challenge Overview The challenge prompt was intentionally vague: Darcy has apparently been having a lot of fun with a unique
Huntress CTF: Darcy Read Post »
Challenge Overview A ransomware recovery challenge hidden inside Windows registry artifacts.You’re given a UTF-16 string dump (strings_utf16.txt) extracted from a
Huntress CTF: The Beyblade Registry Hunt Read Post »