SuhailmalikThe Report II —Blue Team LabsAs part of the SOC improvement process, you were assigned a task to study a report released by MITRE and suggest some useful outcomes for…Jun 24Jun 24
Suhailmalik[Medium] Log Analysis — Sysmon ( BlueTeamLabs )You are provided with Sysmon logs from a compromised endpoint. Analyse the logs to find out the steps and techniques used by the attacker.Jun 19Jun 19
Suhailmalik[Medium] Network Analysis — Ransomware (BlueTeamLabs)Write-up for Network Analysis — Ransomware challenge.Jun 15Jun 15
Suhailmalik[Easy] The Report — Blue Team LabsThis is the write-up for The Report challenge of blueteamlabs. This is an easy challenge under the category of security operations.Jun 12Jun 12
Suhailmalik[Easy] Phishing Analysis 2 — Blue Team Labs OnlineThis is a write-up of the Phishing Analysis 2 challenge of BlueteamLabs.Jun 11Jun 11
SuhailmalikPhishing Analysis — BlueTeamLabsOnlineThis is a walkthrough for the Phishing Analysis challenge of BTLO. It is under the category of security operations.Jun 9Jun 9
SuhailmalikBuilding and Attacking a Home Lab: Kali Linux, Windows, and Splunk for TelemetryBuilding a comprehensive cybersecurity lab environment using Windows, Kali, Procmon and Splunk.Jun 6Jun 6
SuhailmalikSplunk Installation on Windows and Logs MonitoringIn this guide, we’ll walk through the steps to install Splunk on a Windows machine and demonstrate how to monitor logs.May 20May 20
SuhailmalikSysmon: Collecting Telemetry for Enhanced SecuritySysmon set up using a config file in a Windows 10 virtual machine and collecting telemetry.May 19May 19
SuhailmalikFlareVM Malware Analysis Lab: Setup and OperationWelcome to the FlareVM Malware Analysis Lab article! In this guide, we’ll explore how to set up, configure, and operate a malware analysis…Mar 20Mar 20