Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

SOC Analyst Challenge

An 18-part Security Operations Centre analyst challenge aimed at developing better cybersecurity skills by simulating SOC operations using the ELK as a SIEM.

Cybersecurity SOC Analyst Challenge

Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18

IfeOctober 25, 2024

Setting up Elastic Defend: this is the EDR (Endpint detection and response) and generate some telemetry. ES > management > integrations > Elastic Defend Add elastic defend Select existing host […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating the Command and Control framework – Mythic Agent Exploit – Part 17

IfeOctober 22, 2024

In investigating a C2 : you will consider the following ways– Network telemetry (existing C2 sessions have a lot of back and forth telemetry)– Heartbeat (You can use a tool […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating RDP Brute force attacks – Part 16

IfeOctober 18, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating SSH brute force Alerts – Part 15

IfeOctober 17, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Ticketing Systems (osTicket) with ELK Integration – Part 14

IfeOctober 15, 2024

Helps keep track of the task at hand, provide an audit trail and accountability. From a SOC perspective, a ticketing system is essential in fulfilling the AAA triad (AAA Framework) […]

Read More
Cybersecurity SOC Analyst Challenge

Create Alerts and Dashboards to detect activity based on Mythic Telemetry – Part 13

IfeOctober 14, 2024

Investigating our recent mythic activity, we return to ES > Discover. Here we search for “svchost-ifebamba.exe” which is our payload, we get some log information below: – we can see […]

Read More
Cybersecurity SOC Analyst Challenge

Command and Control (C2) attack simulation with Kali Linux and Mythic Server – Part 12

IfeOctober 13, 2024

Setup a Kali Linux on your local system (Not cloud). This will be our attack machine for the Command and Control Operation. Mythic server requires a minimum of 2 vCPUs […]

Read More
Cybersecurity SOC Analyst Challenge

Understanding Command and Control and simulating an attack – Part 11

IfeOctober 11, 2024

Executing malicious executable may trigger other commands to run which gather information about your device or network such as whoami, ipconfig, nslookup, net user etc Such malware can persist in […]

Read More
Cybersecurity SOC Analyst Challenge

Create a Dashboard for Windows RDP activity with Kibana – Part 10

IfeOctober 8, 2024

Elasticsearch > Analytics > Maps … the you can compose your query: event.code: 4625 and agent.name: IfeBamba-WINSERVER Add Layer > Select Choropeth: Use the Add layer options as seen in […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts in Kibana -Windows (RDP) – Part 9

IfeOctober 6, 2024

Understanding RDP Used for communication between the Terminal Server and the terminal server client; it is encapsulated within TCP; uses port 3389. RDP can be exploited through the exposure of […]

Read More

Posts pagination

1 2

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES