Posts by Year
2023
Post Exploitation Techniques & Defense
Post Exploitation Techniques & Defense
Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
Reflected Cross-Site Scripting (XSS)
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
Basic Packet Analysis Using Wireshark
We will walk you through the required skills and knowledge to perform a basic packet analysis using Wireshark
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
Introduction to SIEM Solution
An introduction to Security Information and Event Management.
CyberTalents Certified SOC Analyst 2023
Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
Recon-ng
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
SIEM 1
What do SOC Analysts need to know about SIEM?
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
CyberTalents Certified SOC Analyst 2023
Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC
Red Hat System Administration I Part 1
Red Hat System Administration I