Mr_ArchitektSome Ugly Truths About Working in Cybersecurity And Nobody Have Told You.From the ugly to the ugliest.Jun 113Jun 113
Mr_ArchitektWhen Sherlock Holmes became a Threat Hunter for a DayMaking correct hypothesis, questions and observations can make you a “Sherlock Holmes” level Threat Hunter.May 27May 27
Mr_ArchitektMy Personal Advices to Improve your Cybersecurity Background to Get a Job.Sometimes it’s not about how much you know, it’s about what do you do and how you do it.May 226May 226
Mr_ArchitektWriting Your First Sigma Rule.Write your first Sigma rule efficiently, profesionally, easy and quick.Mar 17Mar 17
Mr_ArchitektLinux Firewall Audit and Detection with auditctl and iptables.Using auditctl and iptables to audit the configurations of iptables properly with EXECVE logs.Feb 26Feb 26
Mr_ArchitektThe Perfect Cybersecurity Project. Part 3/3.Pentesting and performing Vulnerability Assessment with the Vulnerability Management Lifecycle, finishing and wrapping it up.Dec 30, 2023Dec 30, 2023
Mr_ArchitektThe Perfect Cybersecurity Project. Part 2/3.Auditing, pentesting and making policies and compliance to a Coffee Shop as a personal cybersecurity project.Dec 19, 20231Dec 19, 20231
Mr_ArchitektThe Perfect Cybersecurity Project. Part 1/3.Creating a Coffee Shop network architecture in GNS3 to make cybersecurity audits, risk and vulnerability assessment.Nov 22, 20235Nov 22, 20235
Mr_ArchitektSecure, Test, Repeat: Crafting the Perfect Vulnerability Assessment Lab.Applying solid Vulnerability Assessment Fundamentals and Vulnerability Management Life Cycle to create a functional Vulnerability…Sep 27, 2023Sep 27, 2023
Mr_ArchitektTryHackMe — Unattended.A write-up of the “Unattended” room on TryHackMe in a Sherlock Holmes perspective.Aug 31, 2023Aug 31, 2023