Introduction PART 1️⃣ welcome to part one of five for the series on the active directory project the goal of this project is to start from nothing at all to a fully functional domain environment [...] Read more
Archives: 2024
BASIC SOC LAB
Introduction Welcome to BASIC SOC LAB Challenge! 🎉 In this post, we’ll kick off our journey by designing the logical architecture of our BSC (BASIC SOC LAB ) environment. A well-crafted diagram [...] Read more
Incident Report for Frozen Yoghurt Ltd
Scenario You have just started a new role as a Security Consultant for Frozen Yoghurt Limited. Name of Company: Frozen Yoghurt Ltd, UK Description: This company specializes in the in-shop sale of [...] Read more
Implementing Secure Communication with OpenSSL: Combining Symmetric and Asymmetric Encryption
Openssl
OpenSSL is an all-around cryptography library that offers an open-source application of the TLS protocol. It allows users to perform various SSL-related tasks, including CSR (Certificate [...] Read more
Malware Analysis
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...] Read more
Malware Analysis
MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...] Read more
SOC Analyst Practical Lab
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...] Read more
SOC Analyst Practical Lab
** Week 1 **
Introduction In this post, In this post, we start by designing the logical architecture of our SOC (Security Operations Center) environment. A clear diagram helps us see the components [...] Read more
Recycle Bin Forensic
The Recycle Bin is a feature in Microsoft Windows that allows users to recover deleted files. When a file is deleted from the computer, it is not immediately erased from the hard drive but instead it [...] Read more
JUMPLIST
Jump Lists were introduced with the release of Windows 7. Jump Lists are automatically created by Windows to allow users to ‘jump to’ or access items they frequently or recently accessed. Jump [...] Read more