top of page

Please access this website using a laptop / desktop or tablet for the best experience


Incident Handlers Checklist and Personalize Windows investigation Cheat Sheet
In previous blogs, I've delved into the intricacies of incident response, providing comprehensive information and theories. However,...
-
Jan 8, 20241 min read
Â
Â
Â


Incident Response Framework Post-Incident Phase
A critical phase: Post-Incident Activities. This phase, often overlooked, holds paramount importance in fortifying an organization's...
-
Jan 8, 20242 min read
Â
Â
Â


Incident Response Framework Recovery Phase
The phase of recovery stands as a critical endeavor, aiming not only to restore systems but also to fortify their resilience against...
-
Jan 7, 20242 min read
Â
Â
Â


Incident Response Framework Eradication Phase
In the realm of cybersecurity incidents, eradication strategy, hold paramount importance in mitigating the aftermath of a breach....
-
Jan 6, 20241 min read
Â
Â
Â


Incident Response Framework Containment Phase
During a cybersecurity incident, the ability to swiftly contain the breach is pivotal to mitigating the potential damages. Containment...
-
Jan 5, 20242 min read
Â
Â
Â


Incident Response Framework: Detection Phase
In this phase we will determine if an incident has place, triage it, and notify relevant stakeholders and analyze it. To understand...
-
Jan 4, 20242 min read
Â
Â
Â


Incident Response Framework: Preparation Phase
In the realm of cybersecurity, the preparation phase of an incident response plan lays the groundwork for effective handling of security...
-
Jan 3, 20242 min read
Â
Â
Â


Incident Response Framework
In Next few posts, I am going Delve deep in incident response and various aspects. Incident Response Procedures: Procedures and...
-
Jan 2, 20241 min read
Â
Â
Â


Welcoming the New Year with Hope and Joy
As the clock strikes midnight, we bid farewell to the past year and warmly welcome the promising dawn of a new one. The New Year...
-
Jan 1, 20241 min read
Â
Â
Â


Celebrate the Holiday Season with Joy and Gratitude
Tis the season to be jolly! As the year draws to a close, we find ourselves surrounded by the warmth of cheerful decorations, the...
-
Dec 24, 20231 min read
Â
Â
Â


Understanding Lateral Movement in Cyber Attacks:
In the realm of cybersecurity, one of the most concerning aspects of an attack campaign is the stealthy progression through a network to...
-
Dec 20, 20233 min read
Â
Â
Â


Unveiling the Threat of Golden Ticket Attacks
"Golden Ticket" attack perform on Active Directory environments. This technique, a perilous offspring of pass-the-hash attacks(Local...
-
Dec 18, 20232 min read
Â
Â
Â


Understanding Pass the Hash Attacks and Mitigation
In the world of cybersecurity, malicious actors are constantly evolving their tactics to breach systems and gain unauthorized access. One...
-
Dec 17, 20232 min read
Â
Â
Â


Understanding Key Concepts in URL Analysis, HTTP Methods, and Response Codes in Cybersecurity
In the realm of cybersecurity, the examination of URLs and the comprehension of HTTP methods and response codes play a pivotal role in...
-
Dec 15, 20232 min read
Â
Â
Â


Suricata configurations Part 4
Configuration Steps 1. Rules Configuration Suricata comes with default rules, but you can add custom rules by specifying their locations....
-
Dec 14, 20232 min read
Â
Â
Â


Suricata Configuration Part 3
Understanding Suricata's Configuration Structure Suricata's configuration resides in YAML format, offering a streamlined and intuitive...
-
Dec 13, 20232 min read
Â
Â
Â


How to Download and Start Suricata Part 2
Any OS can be used. But in this case I am using ubuntu. (Later in future I will share blog about how to run in windows as well. History...
-
Dec 11, 20231 min read
Â
Â
Â


Exploring Suricata: Part 1
In this guide, I'll delve into the world of Suricata, covering its installation, configuration, and its prowess as a robust intrusion...
-
Dec 10, 20231 min read
Â
Â
Â
Understanding IP, DNS Analysis, and Strategies to Combat Evolving Threats
The landscape of cyber threats is continually evolving, and attackers are employing sophisticated techniques to circumvent traditional...
-
Dec 9, 20232 min read
Â
Â
Â


Unveiling the Power of CentralOps
"In a world where data is king, CentralOps stood as a beacon, offering a treasure trove of internet-related information at users'...
-
Dec 8, 20231 min read
Â
Â
Â
bottom of page