This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Introduction to Tmux and Audit Logs
While creating the Automation Series, I have started looking into various ways to run processes in parallel using commandline. I looked into nohup, screen, etc. but I always ran into issues with au...
Automation Series Part 2: Creating Bots
This blog post forms part of the Automation Series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building bl...
Automation Series Part 1: Vagrant & Ansible
This blog post will be the first in the series where I try to automate a “mystery” process. While the initial blog posts will not provide any specific details, they will provide the building blocks...
Setting up a Basic AD Lab Environment
I wasn’t going to be making a post on this topic, but since a few of my posts refer back to having a domain set up, I thought it would be useful to explain the process of setting up your own local ...
Digging in to EventID 4625
Using event logs to determine whether an attack is possible has been used by blue and red teams alike. Several hacking groups such as turla have been using antivirus logs to determine whether their...
Art and Science
This post is going to focus on the importance of having both an intellectual as well as an artistic outlet in ones life, and provide you with some great free resources that I have come across which...
Starting out with Kibana and ElasticSearch-DSL
Over the course of the past few weeks, I have been looking into Splunk and Kibana. This post isn’t a comparison of the two, but there are several posts covering this topic. Splunk is a great altern...