empiseTryHackMe — Tempest WriteupThis room aims to introduce the process of analysing endpoint and network logs from a compromised asset. Given the artefacts, we will aim…Jan 30
Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24Oct 24
empiseTryHackMe — Tempest WriteupThis room aims to introduce the process of analysing endpoint and network logs from a compromised asset. Given the artefacts, we will aim…Jan 30
Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24
jcm3Sysmon | TryHackMe — WalkthroughHey all, this is the twenty-ninth installment in my walkthrough series on TryHackMe’s SOC Level 1 path which covers the fifth room in this…Mar 7
Jashanpreet Singh🔍Day 8: Understanding Sysmon for Enhanced Endpoint Visibility 🚀Let’s get started!!!Sep 8
Drew ArpinoLetsDefend — Log Analysis with Sysmon WalkthroughAn Endpoint Forensic Investigation with Sysmon, EvtxECmd, Timeline Explorer, and MITRE ATT&CKNov 18