Skip to content
TechNotes

TechNotes

Exploring Tech

  • Home
  • Categories
    • Cloud
    • Linux
    • Cybersecurity
    • AI
    • DevSecOps
  • Projects
  • About Me
  • Thoughts in Text

we

Cybersecurity

Investigating Malware attachments In Emails – LetsDefend.io

IfeJanuary 24, 2025

In this post, I will be conducting an SOC analysis / investigation on an alert generated on a SIEM (Using letsdefend.io) to determine if a suspicious attachment in an email […]

Read More
Cybersecurity SOC Analyst Challenge

Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18

IfeOctober 25, 2024

Setting up Elastic Defend: this is the EDR (Endpint detection and response) and generate some telemetry. ES > management > integrations > Elastic Defend Add elastic defend Select existing host […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating RDP Brute force attacks – Part 16

IfeOctober 18, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Investigating SSH brute force Alerts – Part 15

IfeOctober 17, 2024

Investigating the things to look for in a brute force attack Go to ES > Security > alerts We look to investigate the following when we investigate an Alert and […]

Read More
Cybersecurity SOC Analyst Challenge

Ticketing Systems (osTicket) with ELK Integration – Part 14

IfeOctober 15, 2024

Helps keep track of the task at hand, provide an audit trail and accountability. From a SOC perspective, a ticketing system is essential in fulfilling the AAA triad (AAA Framework) […]

Read More
Cybersecurity SOC Analyst Challenge

Create Alerts and Dashboards to detect activity based on Mythic Telemetry – Part 13

IfeOctober 14, 2024

Investigating our recent mythic activity, we return to ES > Discover. Here we search for “svchost-ifebamba.exe” which is our payload, we get some log information below: – we can see […]

Read More
Cybersecurity SOC Analyst Challenge

Command and Control (C2) attack simulation with Kali Linux and Mythic Server – Part 12

IfeOctober 13, 2024

Setup a Kali Linux on your local system (Not cloud). This will be our attack machine for the Command and Control Operation. Mythic server requires a minimum of 2 vCPUs […]

Read More
Cybersecurity SOC Analyst Challenge

Create a Dashboard for Windows RDP activity with Kibana – Part 10

IfeOctober 8, 2024

Elasticsearch > Analytics > Maps … the you can compose your query: event.code: 4625 and agent.name: IfeBamba-WINSERVER Add Layer > Select Choropeth: Use the Add layer options as seen in […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts in Kibana -Windows (RDP) – Part 9

IfeOctober 6, 2024

Understanding RDP Used for communication between the Terminal Server and the terminal server client; it is encapsulated within TCP; uses port 3389. RDP can be exploited through the exposure of […]

Read More
Cybersecurity SOC Analyst Challenge

Creating Alerts and Dashboards in Kibana (Linux) – Part 8

IfeOctober 5, 2024

Events generated for our Linux Agent is seen below, we have a total of 387 events. In creating our dashboards, we will be focusing on the following fields: We click […]

Read More

Posts pagination

1 2

Categories

  • AI
  • AI Tools
  • Cybersecurity
  • General
  • Linux
  • Projects
  • SOC Analyst Challenge
  • SysAdmin
  • Tools
  • Virtual Infrastructure with VMware

Recent Posts

  • Exploring Warp: The AI-Powered Terminal
  • Troubleshooting a database connectivity issue with PostgreSQL on a Linux Machine
  • Setting Up a Virtual Infrastructure with VMware ESXi, vCenter Server, and vSphere: A (Not so) quick dive!
  • Investigating Malware attachments In Emails – LetsDefend.io
  • Deploying Elastic Defend for EDR (Endpoint Detection and Response) – Part 18
Copyright 2025. All rights reserved.
Powered by RS WP THEMES