top of page
Blog
Search


Entra ID Attack & Defense: Building an Azure→Splunk Log Pipeline
It’s been about five months since my last post, life has been busy as I’ve been ramping up in my new Threat Response role. The learning curve has been thrilling. Over the past few months I’ve been deepening my understanding of detection engineering, incident response, and how attackers move across a much wider set of technologies beyond the traditional Windows stack. Now I’m shifting gears again, and I figured I shouldn’t leave you all behind. I’m going to spend some time bre
Nov 166 min read


Investigating Forwarding Rule Alerts on Shared Mailboxes
a-question-well-posed-is-a-problem-half-solved-investigating-mailbox-forwarding-alerts-on-shared-ma This past week, I was asked: “How can...
Jun 13 min read


Simulating a Real-World Attack: The Logs Don't Lie
This is the final part in the Breach and Containment series that I have worked on this weekend. In the first part, we played the role of...
May 259 min read


Simulating a Real-World Attack: The Breach Begins
In this post, we’re going to simulate a breach on an endpoint in our domain, investigate the activity through logs, and build the...
May 258 min read


Amadey Malware - Investigation Walkthrough
I have recently been doing Cyber Defenders labs in their Blue Yard Cyber range to get more reps in from a DFIR perspective. This week we...
Apr 27 min read


Building a Web Scraper with Python
I've been working on my Python skills for Cybersecurity, taking on various projects that expose me to various facets of Python that would...
Mar 2311 min read


Building a Port Scanner with Python
One of my goals for this year was to work on improving my programming skills. The way I have been approaching this is by revisiting...
Mar 93 min read


Automating Response SOAR EDR - Building an Interactive Slack App (Bonus Section)
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 2512 min read


Automating Response SOAR EDR - The SOAR (Tines) Playbook - Part B
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read


Automating Response SOAR EDR - The SOAR (Tines) Playbook - Part A
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read


Automating Response SOAR EDR - Tines and Slack Integration
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 254 min read


Automating Response SOAR EDR - LimaCharlie Setup
Part 1: Setup LimaCharlie sensor and exploring the telemetry and benefits of the EDR Part 2: Integrating our SOAR (Tines) and the...
Feb 258 min read


How to Ace the GCIH
SEC504 the GCIH Exam: Insights and Preparation In my last certification review post back in November 2024, found here:...
Feb 95 min read


Streamlining Incident Response: Using PowerShell to Compare Baselines and Detect IoCs
How PowerShell Can Fast-Track Your Security Incident Investigations In cybersecurity, the ability to quickly identify deviations from a...
Jan 223 min read


How to ACE the GIAC Certified Forensic Examiner (GCFE) Exam
Taking on FOR500 and sitting the GCFE Exam: Insights and Preparation It's been a minute since I last made a blog post, but as you can see...
Nov 26, 20248 min read


Unlocking the Windows Registry: A Hidden Goldmine for Cyber Threat Detection 🔒🛡️
A guide to Detecting and Mitigating Registry-Based Persistence Mechanisms The Windows Registry is often an underutilized asset in the...
Oct 28, 20244 min read


Building a File Integrity Monitoring Tool with PowerShell
Introduction Hey everyone! 👋 I'm excited to share a project I've been working on that's both a fun challenge and a crucial tool in...
Oct 20, 20248 min read


Microsoft Sentinel Detection Lab
Welcome to the Microsoft Sentinel and Honey pot detection lab. Please note that this lab includes troubleshooting steps I had to do along...
Oct 14, 202411 min read


Investigating Let's Defend Alert SOC146
How do Security Analyst investigate alerts? Well, it can vary. However, I will be going through an investigation methodology which...
Mar 13, 20234 min read


Cybersecurity Home Lab - Splunk logs and Troubleshooting
Part 6b- Ingesting logs in Splunk (Troubleshooting & Network Migration) Part 1- Configuring pfsense Part 2- Configure Security Onions IDS...
Mar 12, 20237 min read
bottom of page