Teddy WHow to Install T-POT Honeypot Framework on a LinuxVMWhy Setting Up a Honeypot is Beneficial for Learning About AttacksOct 27Oct 27
Teddy WCreating a Playbook with SOAR: Step-by-Step Guide Part 3In this final part of this series, I will create a Slack and Tines account and utilize Tines to automate various processes. This includes…Jul 22Jul 22
Teddy WCreating a Playbook with SOAR: Step-by-Step Guide Part 2In the second part of the series, I will focus on generating telemetry from Lazagne which is a password recovery tool and then create a…Jul 10Jul 10
Teddy WUnderstanding VPN LogsThrough the use of technology, you can access to a local network from anywhere in the globe as if you were physically there thanks to a…Jun 26Jun 26
Teddy WHow to Read Firewall LogsSimilar to gatekeepers on your network, firewalls control what enters and leaves. They produce logs that document every action that goes…Jun 25Jun 25
Teddy WHow to Hack a Remote Server with a Metasploit ExploitAlthough cybersecurity is a fascinating field, getting started can be challenging, particularly if you want to learn how to hack in a…Apr 19Apr 19