Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

mythic

Cybersecurity SOC Analyst Challenge

Command and Control (C2) attack simulation with Kali Linux and Mythic Server – Part 12

IfeOctober 13, 2024

Setup a Kali Linux on your local system (Not cloud). This will be our attack machine for the Command and Control Operation. Mythic server requires a minimum of 2 vCPUs […]

Read More

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES