jonCyberDefenders — Obfuscated Blue Team LabScenario: During your shift as a SOC analyst, the enterprise EDR alerted a suspicious behavior from an end-user machine. The user indicated…Jul 1Jul 1
jonCyberDefenders — HoneyBOT Blue Team LabScenario: A PCAP analysis exercise highlighting attacker’s interactions with honeypots and how automatic exploitation works.. (Note that…Jun 17Jun 17
jonCyberDefenders — Lespion Blue Team LabScenario: You, as a soc analyst, have been tasked by a client whose network was compromised and brought offline to investigate the incident…Jun 13Jun 13
jonCyberDefenders — GrabThePhisher Blue Team LabScenario: An attacker compromised a server and impersonated https://pancakeswap[.]finance/, a decentralized exchange native to BNB Chain…Jun 12Jun 12
jonCyberDefenders — Insider Blue Team LabScenario: After Karen started working for ‘TAAUSAI,’ she began to do some illegal activities inside the company. ‘TAAUSAI’ hired you as a…Jun 11Jun 11
jonBlue Team Level 2 (BTL2) — Course & Exam ReviewMy review on the BTL2 (Blue Team Level 2) and exam.Jun 10Jun 10
jonCyberDefenders — RedLine Blue Team LabScenario: As a member of the Security Blue team, your assignment is to analyze a memory dump using Redline and Volatility tools. Your goal…Jun 7Jun 7
jonCyberDefenders — Tomcat Takeover Blue Team LabScenario: Our SOC team has detected suspicious activity on one of the web servers within the company’s intranet. In order to gain a deeper…Jun 7Jun 7
jonPractical Junior Malware Researcher (PJMR) — Course & Exam ReviewMy review on the PMAT (Practical Malware Analysis & Triage) and PJMR (Practical Junior Malware Researcher) exam.Jan 2Jan 2
jonPMAT — Wannahusky RansomwareThis post covers my analysis of the malware sample Sikomode from the PJMR (Practical Junior Malware Researcher) course. This analysis is…Dec 10, 2023Dec 10, 2023