Introduction PART 1️⃣ welcome to part one of five for the series on the active directory project the goal of this project is to start from nothing at all to a fully functional domain environment [...]
Introduction Welcome to BASIC SOC LAB Challenge! 🎉 In this post, we’ll kick off our journey by designing the logical architecture of our BSC (BASIC SOC LAB ) environment. A well-crafted diagram [...]
Scenario You have just started a new role as a Security Consultant for Frozen Yoghurt Limited. Name of Company: Frozen Yoghurt Ltd, UK Description: This company specializes in the in-shop sale of [...]
Openssl
OpenSSL is an all-around cryptography library that offers an open-source application of the TLS protocol. It allows users to perform various SSL-related tasks, including CSR (Certificate [...]
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...]
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...]
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...]
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...]
The Recycle Bin is a feature in Microsoft Windows that allows users to recover deleted files. When a file is deleted from the computer, it is not immediately erased from the hard drive but instead it [...]
Jump Lists were introduced with the release of Windows 7. Jump Lists are automatically created by Windows to allow users to ‘jump to’ or access items they frequently or recently accessed. Jump [...]