DWYNTechMaximizing OpenSearch Potential: A Guide to Rule Creation for Enhancing Security Monitoring with…IntroductionSep 8Sep 8
DWYNTechSliver C2 — Overview HTTP Beacon & HTTP Beacon Traffic AnalystA new era of command and control framework as Cobalt Strike alternative has arrived. Let me introduce SliverC2 Adversary Emulation…Sep 18, 2022Sep 18, 2022
DWYNTechWalkthrough: Shared — HackTheBoxIn this article, I will tell you about my walkthrough the Shared challenge from HackTheBox. Cause this is my first time making walkthrough…Aug 19, 2022Aug 19, 2022
DWYNTechDocuments into Malwareverse : CVE-2022–30190 PoC, Log Analysis and MitigationIndependent security researcher @nao_sec on may 27th found a malicious document in the wild that utilize remote HTML template to execute…Jun 12, 2022Jun 12, 2022
DWYNTechBTLO: Log Analysis — Compromised WordPressHello !, This article about BTLO Challenge is about log analysis. Before we start I want to tell you about BTLO.May 19, 2022May 19, 2022
DWYNTechMonitor events with ELK Stack : Foward Log with Rsyslog and Syslog-ng.This part on Monitor Events with ELK Stack using Rsyslog as Client and Syslog-ng as Central log Server.Mar 26, 2022Mar 26, 2022
DWYNTechMonitor events with ELK Stack : Deploy ELK Stack with Docker ComposeDo you want to monitor all your activities efficiently? With ELK Stack is possible !. In this article, we discuss Events Monitoring with…Feb 10, 2022Feb 10, 2022
DWYNTechVBA Macro on Word Documents into Malwareverse : Emotet The TerribleRobert work as an IT Staff Company besides his work, Robert tries to mining cause he thinks with mining he can grow money so fast. One day…Jan 7, 2022Jan 7, 2022
DWYNTechVBA Macro on Word Documents into MalwareverseThere are Metaverse who famous cause Mark Zuckerberg release a 3D virtual environment and you know Spiderman No Way Home introduces…Dec 25, 2021Dec 25, 2021