PinnedRyan StewartDetecting Signs of a Potential Local File Inclusion (LFI) AttackThis write-up is intended for the LetsDefend “SOC170” Investigation and is for educational purposes only.Jan 25Jan 25
PinnedRyan StewartSecuring Access: A Dive into HTTP Basic Authentication CTFThis write-up is intended for the LetsDefend “Http Basic Auth” challenge and is for educational purposes only.Dec 13, 2023Dec 13, 2023
PinnedRyan StewartAgent Unveiled: Reveal The OperativeThis write-up is intended for the LetsDefend “Disclose The Agent challenge” and is for educational purposes only.Dec 15, 2023Dec 15, 2023
PinnedRyan StewartCracking the Code: Understanding Web Attack ExploitsThis write-up is intended for the LetsDefend “Investigate Web Attack challenge” and is for educational purposes only.Dec 14, 2023Dec 14, 2023
PinnedRyan StewartUnveiling the Hack of Phishing EmailsThis write-up is intended for the LetsDefend Phishing challenge and is for educational purposes only.Dec 5, 2023Dec 5, 2023
Ryan StewartWhy Analysts Opt to Weaken Virtual Machines for Malware AnalysisWeakening a virtual machine (VM) for malware analysis is a common practice to simulate a vulnerable environment that closely resembles…Jan 31Jan 31
Ryan StewartMalicious Deception: AKA the Shadow ScriptThis write-up is intended for the LetsDefend “Malicious Doc” challenge and is for educational purposes only.Dec 21, 2023Dec 21, 2023
Ryan StewartConfigure Basic Wireless SecurityFortifying Connections with Cisco's Packet TracerDec 4, 2023Dec 4, 2023
Ryan StewartUnmasking the World of Threat HuntingWhat on Earth is Threat Hunting?Dec 3, 2023Dec 3, 2023