Are you aware or will you be hooked? Lately, the ponds have enlarged and the number of fishermen have increased. By now you should have known what I am talking about - Phishing. image courtesy o...
Phish_Aware
Overpass 2 - Hacked
This is the second room in a series of three Overpass rooms i.e Overpass, Overpass 2 - Hacked, and Overpass 3 - Hosting. In this room, the main focus area is Network forensics where we are tasked...
BTLO - Phishing Analysis
BlueTeamsOnline - Phishing Analysis Hello there! Today we are going to perform some analysis on a phishing email. This is a challenge on Blue Teams Lab Online. In this challenge, I will be using ...
First Post
Writing the first Jekyll post In the previous post, I walked you through step-by-step on how to set up a personal blog on Github pages using the Jekyll Chirpy theme. Here, I will guide you on addi...
Blogging Guide
How to Set up a blog on Github pages There are many benefits - personal and professional - of having a personal blog. It gives you a platform to express your creative ideas and share knowledge to ...
BlueTeamLabsOnline - Deep Blue
Hello. Welcome to my blog. I will take you through the Deep Blue challenge found at https://blueteamlabs.online/home/investigation/deep-blue-a4c18ce507 (username is: btlo and no password) The gi...
Windows Fundamentals
Introduction Windows is one of the most used operating system. Therefore, it is very crucial for a security analyst to have a deeper understanding of the operating system. This module, covers th...