Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

our

Cybersecurity SOC Analyst Challenge

Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18

IfeOctober 25, 2024

Setting up Elastic Defend: this is the EDR (Endpint detection and response) and generate some telemetry. ES > management > integrations > Elastic Defend Add elastic defend Select existing host […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating SSH brute force Alerts – Part 15

IfeOctober 17, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Ticketing Systems (osTicket) with ELK Integration – Part 14

IfeOctober 15, 2024

Helps keep track of the task at hand, provide an audit trail and accountability. From a SOC perspective, a ticketing system is essential in fulfilling the AAA triad (AAA Framework) […]

Read More
Cybersecurity SOC Analyst Challenge

Command and Control (C2) attack simulation with Kali Linux and Mythic Server – Part 12

IfeOctober 13, 2024

Setup a Kali Linux on your local system (Not cloud). This will be our attack machine for the Command and Control Operation. Mythic server requires a minimum of 2 vCPUs […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts and Dashboards in Kibana (Linux) – Part 8

IfeOctober 5, 2024

Events generated for our Linux Agent is seen below, we have a total of 387 events. In creating our dashboards, we will be focusing on the following fields: We click […]

Read More
Cybersecurity SOC Analyst Challenge

Deploying and using the ELK Stack (Elasticsearch, Logstash, Kibana) stack and its benefits – Part 2

IfeSeptember 26, 2024

E – ElasticSearch : (Store, Search, Analyze)This solution helps you securely take data from any source, in any format, search, analyze and visualize it in real time. In our case, […]

Read More
Cybersecurity SOC Analyst Challenge

SOC Analyst Challenge – Part 1

IfeSeptember 25, 2024

This challenge in aimed at gaining SOC (Security Operations Centre) analysis skills. I will be exploring different aspects of SOC operations and analysis –setting up the ELK (Elasticsearch, Logstash and […]

Read More

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES