Published inInfoSec Write-upsFalconEye: Splunk Threat HuntingThis article provides my approach for solving the FalconEye blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 16, 2023Jul 16, 2023
Published inInfoSec Write-upsQRadar Threat Hunting: Blue Team CTF ChallengeThis article provides my approach for solving the Qradar101 blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 2, 2023Jul 2, 2023
Published inInfoSec Write-upsPMAT — Bonus Ransomware BinaryThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 15, 2023Apr 15, 2023
Published inInfoSec Write-upsPMAT — Bonus Malware Lab WriteupThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 10, 2023Apr 10, 2023
Splunk Core Certified Power User (SPLK-1002) : Certification ExperienceIntroductionJan 28, 2023Jan 28, 2023
Splunk Core Certified User (SPLK-1001) : Certification ExperienceIntroductionDec 24, 20221Dec 24, 20221
Published inInfoSec Write-upsS3 Bucket: Cloud Trail Log AnalysisThis article provides my approach for solving the Bucket CTF challenge created by Scott Piper on the CyberDefenders website, a blue…Aug 31, 2022Aug 31, 2022