Today I participated in a public initiative called Engineers for a day that promotes to high-schools students the option for engineering and technologies, deconstructing the idea that these are male domains, by having only women specialists to present different technological and engineering industries to the students.
[Read More]
About Social Engineering
ITSecurity interview
Blue Team Labs - Deep Blue
A Windows forensics lab
In this post we will do the BlueTeamLabs’ Deep Blue lab. Doing these labs that are associated to a specific tool is a good way to test out available tools so you can find the best to have in your arsenal.
[Read More]
How to investigate a web attack
Using pandas
In this post I showcase samples of useful search queries when investigating a web attack.
[Read More]
How to run cronjobs
Using WSL
In the last post we saw how to create a python-based tool to monitor Telegram. Like that one, security researchers have a panoply of threat monitors to keep up with what’s going on in the wild.
[Read More]
How to monitor Telegram
Simple python tool
As a security researcher, it is our job to monitor threat actors activity and the forums where they interact.
[Read More]
TweetDeck for Security Researchers
Curated threat intelligence via Twitter
On Jun 12 I got the sad news from https://twitter.com/simonbyte that, because of new restrictions to Twitter’s API, my favorite web tool to daily monitor vulnerabilities - CVETrends - is down.
[Read More]
Threat Hunting for Beginners
1-year review as a Threat Hunter
This month was marked by my 1-year anniversary as a Threat Hunter (and my actually birthday 😁) so I thought it would be a nice idea to share what I have learned this year about threat hunting.
[Read More]
Hunt for a QBot infrastructure
Using JARM and HTTP Response hash (step-by-step guide)
In this post I will show you how we can hunt for a malicious infrastructure using a few standard concepts and tools.
[Read More]
Finding the perfect Markdown note-taking app
As an avid note-taker, I need to keep my notes organized and accessible from multiple devices in order to be in touch with all my research, experiments and other projects.
[Read More]
My favorite OSINT shortcuts
Today I will be sharing some of my favorite shortcuts I have in my browser and use in my day-to-day as a Threat Hunter.
[Read More]
2022 Review
2022 was filled with many ups and downs 📈📉.
[Read More]
How to build a simple Slack bot with Python
2022 Tutorial
If you enjoy automating your workflows, a Slack bot might be just what you need.
[Read More]
How ransomware works
A high-level overview
Ransomware attacks have become increasingly more sophisticated, making it more difficult for organizations to defend against and recover from these attacks 🏴☠️.
[Read More]
CyberDefenders CyberCorp Case 2 - Write-Up Part 3
Final Part
Finishing solving the CyberCorp Case 2 challenge from CyberDefenders.
[Read More]
CyberDefenders CyberCorp Case 2 - Write-Up Part 2
Part 2/3
Continuing solving the CyberCorp Case 2 challenge from CyberDefenders.
[Read More]
CyberDefenders CyberCorp Case 2 - Write-Up Part 1
Detailed solution (beware of spoilers!)
The CyberCorp Case 2 challenge from CyberDefenders is all about Threat Hunting 🕵️♀️, and as I recently started a Threat Hunter role I thought it would be a fun exercise.
[Read More]
CyberDefenders Malware Traffic Analysis #1 - Write-Up
Using only Wireshark
Wanting to refresh my Wireshark skills, I enrolled in CyberDefender practice labs and chose the “Malware Traffic Analysis #1” to start with.
[Read More]
Setup a keyboard shortcut to paste text
How to use a key combination to paste any text you want
There are quite a few situations where you surely have felt that you are writing the same thing over and over again.
[Read More]
Customize your XFCE menu
How to add folders and AppImages to XFCE menu
If you are using XFCE desktop environment (DE) you might have seen that it isn’t possible to access folders directly from the menu.
[Read More]
Encoding vs. Encryption vs. Hashing
The main differences
You might have heard about these words, Encoding, Encryption and Hashing, used interchangeably.
[Read More]
Log4Shell
A step-by-step demonstration of the exploit in action
One month ago, on December 9, 2021, a code execution vulnerability identified as CVE-2021-44228, dubbed Log4Shell, affecting Java Log4j logging library was published.
[Read More]
2021 Review
2021 was a very particular year.
[Read More]
How would you secure a server?
The most popular interview question, for good reason.
Servers are vital elements in organizations.
[Read More]
Concepts you need to know when starting on a SOC
A list of known acronyms in the security field
Recently I have started a job in a SOC (Security Operations Center).
[Read More]
Tools I Used For My MSc Thesis
Today marks one year I finished my masters.
[Read More]
Mentorship Experience Review
This was the first mentorship program I was a part of. Today is the last day of the program so I decided to highlight my takeaways from the whole experience.
[Read More]
Plan a Project Hand-over
Step-by-step of how to prepare a project hand-over
When you leave a project you have to make sure that it is left in prepared hands.
[Read More]
Setup Your Personal Website For Free
How to use Jekyll and GitHub Pages
In this post I will show you how I created my first personal website on GitHub Pages using Jekyll.
[Read More]