Teddy WCreating a Playbook with SOAR: Step-by-Step Guide Part 2In the second part of the series, I will focus on generating telemetry from Lazagne which is a password recovery tool and then create a…Jul 10Jul 10
Teddy WUnderstanding VPN LogsThrough the use of technology, you can access to a local network from anywhere in the globe as if you were physically there thanks to a…Jun 26Jun 26
Teddy WHow to Read Firewall LogsSimilar to gatekeepers on your network, firewalls control what enters and leaves. They produce logs that document every action that goes…Jun 25Jun 25
Teddy WHow to Hack a Remote Server with a Metasploit ExploitAlthough cybersecurity is a fascinating field, getting started can be challenging, particularly if you want to learn how to hack in a…Apr 19Apr 19