HacktivitiesinInfoSec Write-upsFalconEye: Splunk Threat HuntingThis article provides my approach for solving the FalconEye blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 16, 2023Jul 16, 2023
HacktivitiesinInfoSec Write-upsQRadar Threat Hunting: Blue Team CTF ChallengeThis article provides my approach for solving the Qradar101 blue team ctf challenge on the CyberDefenders website, a blue team-focused…Jul 2, 2023Jul 2, 2023
HacktivitiesPractical Junior Malware Researcher (PJMR) Certification ReviewIntroductionMay 8, 20231May 8, 20231
HacktivitiesinInfoSec Write-upsPMAT — Bonus Ransomware BinaryThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 15, 2023Apr 15, 2023
HacktivitiesinInfoSec Write-upsPMAT — Bonus Malware Lab WriteupThis article provides my approach to analyzing a bonus malware binary as part of the Practical Malware Analysis & Triage (PMAT) course…Apr 10, 2023Apr 10, 2023
HacktivitiesSplunk Core Certified Power User (SPLK-1002) : Certification ExperienceIntroductionJan 28, 2023Jan 28, 2023
HacktivitiesSplunk Core Certified User (SPLK-1001) : Certification ExperienceIntroductionDec 24, 20221Dec 24, 20221
HacktivitiesinInfoSec Write-upsS3 Bucket: Cloud Trail Log AnalysisThis article provides my approach for solving the Bucket CTF challenge created by Scott Piper on the CyberDefenders website, a blue…Aug 31, 2022Aug 31, 2022
HacktivitiesPractical Network Penetration Tester (PNPT) Certification ReviewIntroductionAug 3, 20221Aug 3, 20221