Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text
Cybersecurity SOC Analyst Challenge

Command and Control (C2) attack simulation with Kali Linux and Mythic Server – Part 12

IfeOctober 13, 2024

Setup a Kali Linux on your local system (Not cloud). This will be our attack machine for the Command and Control Operation. Mythic server requires a minimum of 2 vCPUs […]

Read More
Cybersecurity SOC Analyst Challenge

Understanding Command and Control and simulating an attack – Part 11

IfeOctober 11, 2024

Executing malicious executable may trigger other commands to run which gather information about your device or network such as whoami, ipconfig, nslookup, net user etc Such malware can persist in […]

Read More
Cybersecurity SOC Analyst Challenge

Create a Dashboard for Windows RDP activity with Kibana – Part 10

IfeOctober 8, 2024

Elasticsearch > Analytics > Maps … the you can compose your query: event.code: 4625 and agent.name: IfeBamba-WINSERVER Add Layer > Select Choropeth: Use the Add layer options as seen in […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts in Kibana -Windows (RDP) – Part 9

IfeOctober 6, 2024

Understanding RDP Used for communication between the Terminal Server and the terminal server client; it is encapsulated within TCP; uses port 3389. RDP can be exploited through the exposure of […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts and Dashboards in Kibana (Linux) – Part 8

IfeOctober 5, 2024

Events generated for our Linux Agent is seen below, we have a total of 387 events. In creating our dashboards, we will be focusing on the following fields: We click […]

Read More
Cybersecurity SOC Analyst Challenge

Installing Elastic Agent on Linux Server and Investigating SSH Brute Force attacks – Part 7

IfeOctober 4, 2024

Next, we Setup a new Linux SSH Server as a Test machine for monitoring Brute Force attacks: SSH into the server and update your linux:> apt-get update && apt-get upgrade […]

Read More
Cybersecurity SOC Analyst Challenge

Ingesting Data into Elasticsearch (Windows) – Part 6

IfeOctober 3, 2024

Elasticsearch Ingest Data Ingesting Sysmon and Windows Defender logs into Elasticsearch Click on Add integrations Search “Windows” and you get We click on Custom Windows Event logs, to gather logs […]

Read More
Cybersecurity SOC Analyst Challenge

Understanding Sysmon for Windows Logs – Part 5

IfeOctober 1, 2024

Understanding SYSMON For windows, logging is enabled by default, but the log information provided is not enough, it doesn’t not track important events such a process creation, hence the need […]

Read More
Cybersecurity SOC Analyst Challenge

Windows Server Component, Elastic Agent and Fleet Server Setup – Part 4

IfeSeptember 30, 2024

We deploy a windows server as we did our Ubuntu server earlier. The difference is that this will not be in in VPC network, as defined in our Network diagram […]

Read More
Cybersecurity SOC Analyst Challenge

Kibana Instance Setup and Install – Part 3

IfeSeptember 28, 2024

  Installing the Kibana application component We will install Kibana following the following steps Reload the systemctl daemon, enable the service, start the service and check the status of the […]

Read More

Posts pagination

1 2 3

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES