Security Writeups
Detailed walkthroughs, CTF solutions, and technical deep dives into various cybersecurity topics.
Threat Hunting with CTI
A guide to using Cyber Threat Intelligence in threat hunting, covering OSINT, commercial providers, and practical labs.
Threat Hunting with Deception
Exploring deception technologies, honeypots, and how to use them to detect attacker presence.
Threat Hunting with DNS
Analyzing DNS logs to detect C2 channels, data exfiltration, and DGA domains.
Threat Hunting with Email Security
Investigating phishing attempts, analyzing email headers, and securing mail gateways.
Threat Hunting with Firewalls
Analyzing firewall logs to detect port scanning, lateral movement, and unauthorized access.
Threat Hunting with IDS/IPS
Understanding signature-based detection and analyzing IDS alerts for false positives and real threats.
Threat Hunting with SIEM
Leveraging SIEM for log aggregation, correlation, and detecting complex attack patterns.
Threat Hunting with WAF
Protecting web applications, detecting SQL injection, XSS, and other OWASP Top 10 attacks.
Threat Hunting with EDR
Leveraging Endpoint Detection and Response for proactive threat hunting and incident investigation.