Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

Cybersecurity

SOC, Incident Response, Digital Forensics

Cybersecurity SOC Analyst Challenge

Creating Alerts in Kibana -Windows (RDP) – Part 9

IfeOctober 6, 2024

Understanding RDP Used for communication between the Terminal Server and the terminal server client; it is encapsulated within TCP; uses port 3389. RDP can be exploited through the exposure of […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts and Dashboards in Kibana (Linux) – Part 8

IfeOctober 5, 2024

Events generated for our Linux Agent is seen below, we have a total of 387 events. In creating our dashboards, we will be focusing on the following fields: We click […]

Read More
Cybersecurity SOC Analyst Challenge

Installing Elastic Agent on Linux Server and Investigating SSH Brute Force attacks – Part 7

IfeOctober 4, 2024

Next, we Setup a new Linux SSH Server as a Test machine for monitoring Brute Force attacks: SSH into the server and update your linux:> apt-get update && apt-get upgrade […]

Read More
Cybersecurity SOC Analyst Challenge

Ingesting Data into Elasticsearch (Windows) – Part 6

IfeOctober 3, 2024

Elasticsearch Ingest Data Ingesting Sysmon and Windows Defender logs into Elasticsearch Click on Add integrations Search “Windows” and you get We click on Custom Windows Event logs, to gather logs […]

Read More
Cybersecurity SOC Analyst Challenge

Understanding Sysmon for Windows Logs – Part 5

IfeOctober 1, 2024

Understanding SYSMON For windows, logging is enabled by default, but the log information provided is not enough, it doesn’t not track important events such a process creation, hence the need […]

Read More
Cybersecurity SOC Analyst Challenge

Windows Server Component, Elastic Agent and Fleet Server Setup – Part 4

IfeSeptember 30, 2024

We deploy a windows server as we did our Ubuntu server earlier. The difference is that this will not be in in VPC network, as defined in our Network diagram […]

Read More
Cybersecurity SOC Analyst Challenge

Kibana Instance Setup and Install – Part 3

IfeSeptember 28, 2024

  Installing the Kibana application component We will install Kibana following the following steps Reload the systemctl daemon, enable the service, start the service and check the status of the […]

Read More
Cybersecurity SOC Analyst Challenge

Deploying and using the ELK Stack (Elasticsearch, Logstash, Kibana) stack and its benefits – Part 2

IfeSeptember 26, 2024

E – ElasticSearch : (Store, Search, Analyze)This solution helps you securely take data from any source, in any format, search, analyze and visualize it in real time. In our case, […]

Read More
Cybersecurity SOC Analyst Challenge

SOC Analyst Challenge – Part 1

IfeSeptember 25, 2024

This challenge in aimed at gaining SOC (Security Operations Centre) analysis skills. I will be exploring different aspects of SOC operations and analysis –setting up the ELK (Elasticsearch, Logstash and […]

Read More
Cybersecurity Tools

Exploring the ELK stack for SOC Analysis

IfeMarch 8, 2024

What is the ELK stack and how can we use it? ELK stands for Elasticsearch, Logstash and Kibana. It is a suite of tools that work together ability to aggregate […]

Read More

Posts pagination

1 2

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES