Skip to content
Twin Security

Twin Security

Infosec news, CTF walkthroughs, cool stuff

  • CTF Cheatsheet
  • YouTube
  • About
  • Contact

Author: Anton Schieffer

  • Home
  • Anton Schieffer
Uncategorized

Advice for entry-level cybersecurity job seekers

September 24, 2023September 24, 2023 Anton Schieffer

A recent tweet by Dave Kennedy in response to a question about the cybersecurity job market got me thinking about the mismatch between what companies

Read More
Bandit Level 11
OverTheWire Bandit

OverTheWire Bandit Challenge Level 11

March 29, 2021March 29, 2021 Anton Schieffer

Bandit Level 11 is designed to teach the basics of the tr command. Tr is a useful command for manipulating text from standard input and

Read More
Microsoft

Detecting compromised accounts by alerting on email forwarding rules

March 3, 2021March 3, 2021 Anton Schieffer

One basic way we can detect compromised Microsoft accounts is by monitoring new email rules.

Read More
Bandit Challenges 5-10
CTF Walkthrough OverTheWire Bandit

OverTheWire Bandit Challenges Levels 5-10

February 14, 2021February 14, 2021 Anton Schieffer

In this tutorial, we’ll go over levels 5-10 from the Bandit CTF from Over The Wire. We’ll talk about the commands used, as well as

Read More
CTF Walkthrough OverTheWire Bandit

Intro: OverTheWire Bandit Challenges and Levels 0-4

February 8, 2021February 14, 2021 Anton Schieffer

One of the first online wargames I ever played was the Bandit wargame by OverTheWire. It’s a fun exercise for anyone who wants to become more comfortable at the command line.

Read More
Tools

Analyzing botnet traffic with Wireshark

January 28, 2021February 14, 2021 Anton Schieffer

I wanted to share a good opportunity for learning Wireshark with some real-life packet capture files. In addition to providing high-level analysis, Palo Alto’s Unit 42 often has tutorials on how to use some security-related tools.

Read More
Tools

Normalizing Events in Graylog With Pipelines

January 5, 2021February 14, 2021 Anton Schieffer

Found an interesting blog post on configuring Graylog to detect threats. Hopefully the next posts they publish will do some follow up for actual threat detection and alerts: this first post is focused on normalizing data.

Read More
Tools

CISA releases Sparrow, a tool for detecting compromised Azure accounts

December 28, 2020February 14, 2021 Anton Schieffer

With the SolarWinds breach in the headlines, CISA has released a tool designed to help Azure and Microsoft 365 clients detect compromised accounts. Sparrow is a Powershell script that gathers data related to potentially compromised accounts and applications in Azure or Microsoft 365.

Read More
Uncategorized

Hello World!

December 28, 2020February 14, 2021 Anton Schieffer

One of my favorite things to do around the holidays is to play the SANS Holiday Hack Challenge. This year, I listened to a talk from Jack Rhysider of Darknet Diaries, who had some words of encouragement on starting a blog.

Read More

Recent Posts

  • Advice for entry-level cybersecurity job seekers
  • OverTheWire Bandit Challenge Level 11
  • Detecting compromised accounts by alerting on email forwarding rules
  • OverTheWire Bandit Challenges Levels 5-10
  • Intro: OverTheWire Bandit Challenges and Levels 0-4

Archives

Categories

  • CTF Walkthrough
  • Microsoft
  • OverTheWire Bandit
  • Tools
  • Uncategorized
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.