Published inInfoSec Write-upsSplunk Series: Masking Sensitive Data (Part 5)Hello, my digital adventurers! I am here with a new Splunk blog.4d ago4d ago
Published inInfoSec Write-upsSOC335 — CVE-2024-49138 Exploitation DetectedHello, my digital adventurers! Today I’m going to investigate the new Letsdefend alert. This alert is about CVE-2024-49138.Feb 4Feb 4
Published inInfoSec Write-upsSplunk Series: Creating a Dashboard to Visualize Your Data (Part 4)Hello, my digital adventurers! I would say that Dashboards are essential for quickly understanding and interacting with data. They give you…Jan 28Jan 28
Published inInfoSec Write-upsSplunk series: Rule Development (Part 3)Hello, my digital adventurers! In today’s blog, I will show you how to create a rule or alert (in Splunk terms) in Splunk. This is the 3rd…Jan 24Jan 24
Published inInfoSec Write-upsSplunk Series: Forwarding Logs Using Universal Forwarder (Part 2)Hello, my digital adventurers. This is the 2nd part of my Splunk series. In this blog, I will show you how to send logs to the Splunk…Jan 21Jan 21
Published inInfoSec Write-upsSplunk Series: Installation Guide for Windows and Linux (Part 1)Hello, my digital adventurers. This is the first part of my Splunk series. I will share more insights about Splunk in my upcoming articles.Jan 19Jan 19
Published inInfoSec Write-upsHackTheBox — Compromised Sherlock WalkthroughIn this challenge, I analyzed a network capture file using Wireshark to uncover details of malicious activity. Below is a step-by-step…Jan 18Jan 18
Published inNerd For Tech3 Mistakes to Avoid as a Beginner in CybersecurityGreetings, fellow digital adventurers! I am Ghostploit, and today I will share my cybersecurity journey and the mistakes I made when I…Jan 14Jan 14
Published inInfoSec Write-upsHow Spanning Tree Protocol (STP) WorksHello everyone. Today I will talk about the Spanning Tree Protocol (STP).Jan 10Jan 10
Published inInfoSec Write-upsA Step-by-Step Guide to Installing and Configuring Active DirectoryIn the world of modern IT infrastructure, Active Directory (AD) is more than just a directory service — it’s the backbone of identity and…Jan 1Jan 1