This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Introducing Walkthroughs
Hi Everyone, During the past few weeks I’ve been working on creating a new section as part of my blog – Walkthroughs. The purpose of this section is to run through Challenge VMs, provide useful in...
Automation Series Part 3: Setting up TheHive
This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Introduction to Tmux and Audit Logs
While creating the Automation Series, I have started looking into various ways to run processes in parallel using commandline. I looked into nohup, screen, etc. but I always ran into issues with au...
Automation Series Part 2: Creating Bots
This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Automation Series Part 1: Vagrant & Ansible
This blog post will be the first in the series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building blocks...
Setting up a Basic AD Lab Environment
I wasn’t going to be making a post on this topic, but since a few of my posts refer back to having a domain set up, I thought it would be useful to explain the process of setting up your own local ...
Digging in to EventID 4625
Using event logs to determine whether an attack is possible has been used by blue and red teams alike. Several hacking groups such as turla have been using antivirus logs to determine whether their...