A recent tweet by Dave Kennedy in response to a question about the cybersecurity job market got me thinking about the mismatch between what companies
Author: Anton Schieffer
Bandit Level 11 is designed to teach the basics of the tr command. Tr is a useful command for manipulating text from standard input and
One basic way we can detect compromised Microsoft accounts is by monitoring new email rules.
In this tutorial, we’ll go over levels 5-10 from the Bandit CTF from Over The Wire. We’ll talk about the commands used, as well as
One of the first online wargames I ever played was the Bandit wargame by OverTheWire. It’s a fun exercise for anyone who wants to become more comfortable at the command line.
I wanted to share a good opportunity for learning Wireshark with some real-life packet capture files. In addition to providing high-level analysis, Palo Alto’s Unit 42 often has tutorials on how to use some security-related tools.
Found an interesting blog post on configuring Graylog to detect threats. Hopefully the next posts they publish will do some follow up for actual threat detection and alerts: this first post is focused on normalizing data.
With the SolarWinds breach in the headlines, CISA has released a tool designed to help Azure and Microsoft 365 clients detect compromised accounts. Sparrow is a Powershell script that gathers data related to potentially compromised accounts and applications in Azure or Microsoft 365.
One of my favorite things to do around the holidays is to play the SANS Holiday Hack Challenge. This year, I listened to a talk from Jack Rhysider of Darknet Diaries, who had some words of encouragement on starting a blog.