Security Investigation
-
Secret Recipe: WALKTHROUGH
Storyline Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original…
-
Unattended: WALKTHROUGH
Welcome to the team, kid. I have something for you to get your feet wet. Our client has a newly hired employee…
-
Endpoint Security: NOTES
Wazuh Wazuh is an open-source, freely available, and extensiveĀ EDRĀ solution, which Security Engineers can deploy in all scales of environments. Wazuh operates on…
-
TShark: NOTES
TShark is an open-source command-line network traffic analyser. It is created by the Wireshark developers and has most of the features of…
-
Wireshark (Defensive)
Capture Filter Syntax These filters use byte offsets hex values and masks with boolean operators, and it is not easy to understand/predict…
-
Brim: NOTES
Brim vs Wireshark vsĀ Zeek While each of them is powerful and useful, it is good to know the strengths and weaknesses of…