Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

Ife

The author has 24 posts

AI AI Tools Tools

Exploring Warp: The AI-Powered Terminal

IfeJune 6, 2025

What is Warp? My first exposure to Warp as a tool was on twitter when a DevOps account I follow tweeted about it. I bookmarked it for further investigation and […]

Read More
Linux SysAdmin

Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine

IfeMay 26, 2025

Troubleshooting Scenario:We have a web application that relies on the PostgreSQL 13 database present on our server. However, the connection to the database is not working. The task is to […]

Read More
Projects Tools Virtual Infrastructure with VMware

Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!

IfeJanuary 30, 2025

I remember the first time I encountered VMware Workstation, I was amused by the wizardly! I was just getting into tech and I wanted to try things out – linux […]

Read More
Cybersecurity

Investigating Malware attachments In Emails – LetsDefend.io

IfeJanuary 24, 2025

In this post, I will be conducting an SOC analysis / investigation on an alert generated on a SIEM (Using letsdefend.io) to determine if a suspicious attachment in an email […]

Read More
Cybersecurity SOC Analyst Challenge

Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18

IfeOctober 25, 2024

Setting up Elastic Defend: this is the EDR (Endpint detection and response) and generate some telemetry. ES > management > integrations > Elastic Defend Add elastic defend Select existing host […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating the Command and Control framework – Mythic Agent Exploit – Part 17

IfeOctober 22, 2024

In investigating a C2 : you will consider the following ways– Network telemetry (existing C2 sessions have a lot of back and forth telemetry)– Heartbeat (You can use a tool […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating RDP Brute force attacks – Part 16

IfeOctober 18, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating SSH brute force Alerts – Part 15

IfeOctober 17, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Ticketing Systems (osTicket) with ELK Integration – Part 14

IfeOctober 15, 2024

Helps keep track of the task at hand, provide an audit trail and accountability. From a SOC perspective, a ticketing system is essential in fulfilling the AAA triad (AAA Framework) […]

Read More
Cybersecurity SOC Analyst Challenge

Create Alerts and Dashboards to detect activity based on Mythic Telemetry – Part 13

IfeOctober 14, 2024

Investigating our recent mythic activity, we return to ES > Discover. Here we search for “svchost-ifebamba.exe” which is our payload, we get some log information below: – we can see […]

Read More

Posts pagination

1 2 3

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES