Posts by Year

2023

Post Exploitation Techniques & Defense

Post Exploitation Techniques & Defense

less than 1 minute read

Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded

Reflected Cross-Site Scripting (XSS)

1 minute read

Red Team Tools

The investigation case about FireEye red team tools. Try to find root cause of incident

3 minute read

Data Breach 01

Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue

3 minute read

SOC175 - PowerShell Found in Requested URL

This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.

3 minute read

SOC202 - FakeGPT Malicious Chrome Extension

SOC202 - FakeGPT Malicious Chrome Extension

6 minute read

Basic Packet Analysis Using Wireshark

We will walk you through the required skills and knowledge to perform a basic packet analysis using Wireshark

9 minute read

SOC145 - Ransomware Detected

SOC145 - Ransomware Detected

2 minute read

Introduction to SIEM Solution

An introduction to Security Information and Event Management.

9 minute read

CyberTalents Certified SOC Analyst 2023

Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools

4 minute read

SOC146 - Phishing Mail Detected - Excel 4.0 Macros

SOC146 - Phishing Mail Detected - Excel 4.0 Macros

4 minute read

SOC173 - Follina 0-Day Detected

SOC173 - Follina 0-Day Detected

6 minute read

Recon-ng

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

5 minute read

SIEM 1

What do SOC Analysts need to know about SIEM?

8 minute read

CyberTalents Certified SOC Analyst Challenges

CyberTalents Blue Team Scholarship 2023

6 minute read

CyberTalents Certified SOC Analyst 2023

Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC

10 minute read

Red Hat System Administration I Part 1

Red Hat System Administration I

7 minute read

Back to top ↑