PinnedJeremiah RallosAn Introduction: $> whoamiMy name is Jeremiah Rallos. At the time of writing this, I’m currently a third-year student double-majoring in Computer Science with Cyber…Apr 29Apr 29
Jeremiah RallosSnort Rules in Practice | TryHackMeIn the previous article, we took an in-depth look into the different operational modes Snort had to offer.Jun 27Jun 27
Jeremiah RallosUsing Snort | TryHackMeSnort, as funny as the name, is an open-source rule-based intrusion detection (IDS) and prevention (IPS) system used on networks and is…Jun 21Jun 21
Jeremiah RallosYARA: Threat Intel, Hunting, and ForensicsYara might sound like a pretty name, but it actually means:May 23May 23
Jeremiah RallosUsing Open Source (OSINT) Threat Intelligence ToolsFor any security-aware or privacy-concerned user or organization, knowing the tools you can use can provide a much greater sense of…May 9May 9
Jeremiah RallosWireshark: Traffic Analysis | TryHackMeIn our final part of the Wireshark series, we are going to be covering different adversarial techniques and how to detect them! Because we…May 4May 4
Jeremiah RallosWireshark: Packet Operations | TryHackMeFirstly.. welcome to Part 2 of the Wireshark guide!May 1May 1
Jeremiah RallosWireshark: The Basics | TryHackMeWhen it comes to building your toolset, using Wireshark is like owning a Swiss army knife. You have a range of tools in such a compact…Apr 29Apr 29