Chances are you have either visited the URL on my resume, or you have accidentally come across this blog. Either way, welcome! I am going to break this down into as much of a wiki as possible.
This blog is focused on cybersecurity overall. I like to experiment with different aspects and try different things. My goal is to focus on SOC Analyst roles and more blue team centered aspects of cybersecurity, but it is a lot easier to learn red in 2021 (well, it has been in 2020 and 2019 when I first started dipping my feet). To do this I will be adding non-conventional network security methods I may have in my home network (with anything I deem sensitive to be scrubbed), any content I complete on any websites, and some random red team/blue team tactics for any hardware related content.
For my red team content I want to try to emphasis a little bit of blue team if possible. To accomplish this I am going to detail the following in each room:
Brooklyn 99
Easy level Try Hack Me box focused on poor access management and steganography.
Anonforce
Easy level Try Hack Me box focused on poor access management, GPG/PGP keys and burteforcing hashes.
SAM
Medium level Blue Team Labs Online box focused on using Volatility2, Wireshark and searching SYSMON files with Linux CLI.
Ducker
Medium level Blue Team Labs Online box focused on Docker and how to use it.
THM test
Praesent tincidunt sed tellus ut rutrum. Sed vitae justo condimentum, porta lectus vitae, ultricies congue gravida diam non fringilla.
Deep Blue
Beginner friendly defense room on Blue Team Labs. Focused on reading Event Viewer logs.