Suhani PatelSOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919]Here is the complete guide for analyzing the SOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919] given on…Sep 12Sep 12
Ivan Cheng關於 Grafana Loki Label 的最佳實踐最近想把 Roche infinity 與 Sysmex HCLAB 檢驗資訊系統產出的檢驗報告透過 HTTP API 推到 Grafana Loki 進行分析。Sep 12Sep 12
Deniz TopaloğluHunt Me I: Payment Collectors — TryHackMe WalkthroughInvestigating the Phishing Incident: A Walkthrough of the Payment Collectors RoomSep 10Sep 10
Festus OlanipekunHOW I ANALYZED A PRIVILEGE ESCALATION LOGIn this BTLO lab, an attacker gained unauthorized access to a server containing sensitive data, which was later leaked on an underground…Sep 5Sep 5
Chicken0248[LetsDefend Write-up] Log Analysis With SysmonOur company has experienced a breach on one of its endpoints. Your task is to investigate the breach thoroughly by analyzing the Sysmon…Sep 2Sep 2
Leopold NsengiyumvaWindows Event Logs — TryHackMe WalkthroughSkills acquired after completing this Hands-on room from TryHackMe:Aug 30Aug 30
ErgunGEvent Log AnalysisEvent Log Oluşan bir hatanın, durumun, olayın zaman damgası ile birlikte kayıt altına alınmasına log denilmektedir. Ortaya çıkan, oluşan…Aug 29Aug 29
Festus OlanipekunHow I Investigated a Suspicious Ransomware Script FileRansomware is a type of malware designed to block access to a user’s or organization’s files by encrypting them. Cyberattackers then demand…Aug 29Aug 29