Cybersecurity Home-lab (Pt 5): Running the tests and Visualizing the alertsWelcome back to this series on enhancing security monitoring with Sysmon, Atomic Red Team, and Wazuh. In the previous part, we successfully…Aug 5, 2024Aug 5, 2024
Cybersecurity Home-lab (Pt 4): Adversary Emulation using Atomic Red Team and detection using Wazuh.IntroductionJul 31, 2024Jul 31, 2024
Cybersecurity Home-lab: pt 3Hello and welcome back!! This is part 3 of this series where we will be installing Wazuh agents on the Active Directory Environment as well…Apr 27, 2024Apr 27, 2024
Cybersecurity Home-lab: pt 2Welcome back to this thrilling series of home-lab building. In part 1 of this series, we installed and configured pfSense. Today we will…Apr 16, 20241Apr 16, 20241
Cybersecurity Home-lab: pt 1Hello there! Welcome to the world of cybersecurity home-lab building! In this write-up, I’ll be sharing my journey and insights into…Apr 15, 2024Apr 15, 2024
Active Directory Pentesting Lab BuildIn this post, we build an Active Directory Lab for pen-testing. This lab is based on the TCM Security Practical Ethical Hacking Course. Get…Apr 2, 2024Apr 2, 2024
Lab #3: Blocking SSH Brute-force Attacks with Active Response in WazuhHello and welcome back!! In the previous Lab, we looked at detecting brute force attacks using Wazuh. This post will discuss blocking…Feb 1, 2024Feb 1, 2024
Lab #2: Detecting Brute-force attack using WazuhWhat is a brute-force attack?Jan 23, 2024Jan 23, 2024