Posts by Year
2025
APT35 (Charming Kitten)
APT35 has been active since at least 2013 and is recognized for its sophisticated use of social engineering tactics.
SideWinder APT Groups
SideWinder APT Groups
ToddyCat APT Group
ToddyCat APT Group
2023
FalconEye Challenge
FalconEye Blue Team Challenge
Post Exploitation Techniques & Defense
Post Exploitation Techniques & Defense
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk
Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
Reflected Cross-Site Scripting (XSS)
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
Basic Packet Analysis Using Wireshark
We will walk you through the required skills and knowledge to perform a basic packet analysis using Wireshark
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
Introduction to SIEM Solution
An introduction to Security Information and Event Management.
CyberTalents Certified SOC Analyst 2023
Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
Recon-ng
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
SIEM 1
What do SOC Analysts need to know about SIEM?
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
CyberTalents Certified SOC Analyst 2023
Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC
Red Hat System Administration I Part 1
Red Hat System Administration I