The GhostPloitA Step-by-Step Installation Guide for DVWA on Ubuntu serverThe Damn Vulnerable Web Application (DVWA) is a software project that intentionally includes security vulnerabilities and is intended for…Oct 25Oct 25
The GhostPloitSOC282 — Phishing Alert — Deceptive Mail DetectedIn this writeup, I will investigate one of the alerts on Letsdefend, “ SOC282 — Phishing Alert — Deceptive Mail Detected ”.Oct 81Oct 81
The GhostPloitFinal Part: Automation with Shuffle SOARThis is the final part, where we will implement the Shuffle SOAR configuration and finalize the overall project. Let’s get started!Jun 11Jun 11
The GhostPloitPart 2: Configuring TheHive and Wazuh, Attack emulations with ARTIn this part, I’ll demonstrate the configuration of TheHive and Wazuh, as well as creating rule in Wazuh. Let’s do it.Jun 1Jun 1
The GhostPloitPart 1: Intro to the SOC Automation Project setupThis is the first part of my SOC Automation Project. I will show and explain in detail the setups of Wazuh, TheHive and Shuffle. But in…Jun 1Jun 1
The GhostPloitSOC251 — Quishing Detected (QR Code Phishing)In this writeup, I will investigate one of the alerts on Letsdefend, “SOC251 — Quishing Detected (QR Code Phishing)”.Mar 31Mar 31
The GhostPloitSOC176 — RDP Brute Force DetectedIn this writeup, I will investigate one of the alerts on Letsdefend, “SOC176 — RDP Brute Force Detected”.Mar 26Mar 26
The GhostPloitLayer 2 attacks & Mitigation techniques (part 2)This article is second part of the previous article. In this article I will talk about DHCP, STP and Address Spoofing attacks.Mar 24Mar 24
The GhostPloitLayer 2 attacks & Mitigation techniquesLayer 2, also known as the Data Link Layer, handles the transmission of data frames between directly connected network nodes, using MAC…Mar 22Mar 22
The GhostPloitText Manipulation tools for Blue TeamText manipulation tools are software tools used to perform various operations on text data. These tools are generally designed to assist…Feb 22Feb 22