Dec 14, 20217 minExploiting log4j | Apache SolrLog4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Nov 20, 20223 minRansomware investigation using Splunk - BlackSunIn this write up, we will be assuming the role of a SOC analyst investigating a ransomware incident using Splunk. The task is to...
Sep 1, 20226 minSilly Putty Malware AnalysisAfter completing the PMAT course, something set into motion. My new found passion for Malware Analysis. This will be the second time I...
Jun 26, 20223 minMcAfee quarantine files - Automating BUP file analysis.Quarantine (.BUP) files, otherwise known as BackUp files, are created by various applications such as McAfee antivirus. McAfee will...
Jan 16, 20223 min Post compromise analysis | Overpass 2In this write up, we will be playing the role of an incident responder, post compromise of a system. The task is to identify what the...