Pak Hong LeeRestrict number of concurrent request from http clientRecently, I have been working on a Go program that can perform a brute force attack on an API endpoint. I’m using goroutine as part of…Apr 29, 2023Apr 29, 2023
Pak Hong LeeThreat hunting exercise: Privilege Escalation by Setuid and SetguidFollow with part one : Threat Hunting Lab Setup — Linux Audit Daemon, introduced audit daemon as a tool for threat hunting. Today, let’s…Mar 23, 20191Mar 23, 20191
Pak Hong LeeExploring Audit Daemon for Threat HuntingRecently I’ve been working for a client who wanna enhance their threat detection capability especially for Redhat. Speaking of what are…Feb 24, 2019Feb 24, 2019