Mohab SalahDNS from the perspective of the Attacker and the DefenderDNS protocol, why attackers use it, and how to defend against itJun 30Jun 30
Mohab SalahCyber Threat Intelligence Concepts and ResourcesIn this report, I will talk about the concepts of threat intelligence, their sources, and some examplesJun 291Jun 291
Mohab SalahCyberDefenders Web Investigation Write-upThe challenge in the Cyberdefender platform:Apr 27Apr 27
Mohab SalahCyberDefenders EscapeRoom Write-upThe challenge in the Cyberdefender platform:https://cyberdefenders.org/blueteam-ctf-challenges/18Oct 28, 2023Oct 28, 2023
Mohab SalahCyberDefenders HoneyBOT Write-upThe challenge in the Cyberdefender platform:https://cyberdefenders.org/blueteam-ctf-challenges/45Oct 17, 2023Oct 17, 2023
Mohab SalahCyberDefenders PacketMaze Write-upThe challenge in the Cyberdefender platform:Oct 14, 2023Oct 14, 2023