Email Analysis Challenge-Lets DefendUpon receiving an unexpected email from someone claiming to represent a well-known company, the task was to carefully analyze its content…Nov 6Nov 6
SOC164 — Suspicious Mshta Behavior-LetsDefendIn this investigation we will begin by looking at the important artifacts given to us by the high alert. The rule name indicates a…Nov 4Nov 4
Malware Traffic Analysis with Wireshark-LetsDefendWireshark is an open-source network protocol analyzer used for capturing and analyzing data traveling across a network in real-time. It’s…Nov 3Nov 3
Splunk Attack Investigation Walkthrough(BOTSV1):Part 1Scenario: A big corporate XYZ has recently faced a cyber-attack where the attackers broke into their network, found their way to the web…Oct 29Oct 29
LetsDefend: Search on SplunkSplunk is a platform designed for searching, monitoring, and analyzing machine-generated data like logs from various sources in real-time…Oct 13Oct 13
Configuring Snort Rules for Optimal Intrusion DetectionSnort is an open-source network intrusion detection and prevention system (IDS/IPS). It operates by analyzing network traffic in real-time…Sep 24Sep 24
LetsDefend: SOC202 — FakeGPT Malicious Chrome ExtensionAt first we will take ownership of this case to as to have a deep investigation on it and find the Indicators of Compromise(IOC’s).Sep 18Sep 18
LetsDefend:SOC169 — Possible IDOR Attack Detected Walk-ThroughAn IDOR (Insecure Direct Object Reference) attack happens when a website or application lets users access or modify data they shouldn’t be…Sep 13Sep 13
LetsDefend: Malicious Document File Analysis 2In this part we are going to analyze the following document that contains malicious malwareSep 10Sep 10