PinnedJeremiah RallosAn Introduction: $> whoamiMy name is Jeremiah Rallos. At the time of writing this, I’m currently a third-year student double-majoring in Computer Science with Cyber…Apr 29Apr 29
Jeremiah RallosElastic Stack (ELK) 101 & Investigating with ELK | TryHackMeThe ELK Stack (Elasticsearch, Logstash, and Kibana) is a powerful open-source platform for searching, analyzing, and visualizing log and…Aug 10Aug 10
Jeremiah RallosSnort Rules in Practice | TryHackMeIn the previous article, we took an in-depth look into the different operational modes Snort had to offer.Jun 27Jun 27
Jeremiah RallosUsing Snort | TryHackMeSnort, as funny as the name, is an open-source rule-based intrusion detection (IDS) and prevention (IPS) system used on networks and is…Jun 21Jun 21
Jeremiah RallosYARA: Threat Intel, Hunting, and ForensicsYara might sound like a pretty name, but it actually means:May 23May 23
Jeremiah RallosUsing Open Source (OSINT) Threat Intelligence ToolsFor any security-aware or privacy-concerned user or organization, knowing the tools you can use can provide a much greater sense of…May 9May 9
Jeremiah RallosWireshark: Traffic Analysis | TryHackMeIn our final part of the Wireshark series, we are going to be covering different adversarial techniques and how to detect them! Because we…May 4May 4
Jeremiah RallosWireshark: Packet Operations | TryHackMeFirstly.. welcome to Part 2 of the Wireshark guide!May 1May 1