Log Analysis
The Enduring Echo
HTB CTF
Read More →The Enduring Echo Report - HTB Holmes
Finding Persistence and Data Exfiltration Challenge
Read More →The Tunnel Without Walls
HTB CTF
Read More →The Tunnel Without Walls Report - HTB Holmes
Linux Memory Forensics
Read More →Hunt Evil with - Sigma
Basic understanding of Sigma rules and it's importance
Read More →