In this project, I will delve into the setup and automation of Secure Operations Center (SOC). Overview Windows 10 Host (hosted in Azure )
Wazuh server (hosted in DigitalOcean cloud)
TheHive server [...]
Introduction PART 1️⃣ welcome to part one of five for the series on the active directory project the goal of this project is to start from nothing at all to a fully functional domain environment [...]
Introduction Welcome to BASIC SOC LAB Challenge! 🎉 In this post, we’ll kick off our journey by designing the logical architecture of our BSC (BASIC SOC LAB ) environment. A well-crafted diagram [...]
Scenario You have just started a new role as a Security Consultant for Frozen Yoghurt Limited. Name of Company: Frozen Yoghurt Ltd, UK Description: This company specializes in the in-shop sale of [...]
Openssl
OpenSSL is an all-around cryptography library that offers an open-source application of the TLS protocol. It allows users to perform various SSL-related tasks, including CSR (Certificate [...]
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...]
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...]
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...]
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...]
The Recycle Bin is a feature in Microsoft Windows that allows users to recover deleted files. When a file is deleted from the computer, it is not immediately erased from the hard drive but instead it [...]