Go Store AppWelcome to my first post about Software. For some months, I have been learning the Go programming language at AltSchools. We were given a…Jan 10, 2023Jan 10, 2023
Published inSystem WeaknessUsing Wazuh and Heartbeat to monitor SSL/TLS certificates.IntroductionJun 5, 2022Jun 5, 2022
Monitoring, monitoring.Earlier in my Cybersecurity journey, I never understood the importance of event logging on a system. I now know that log collection and…Apr 10, 2022Apr 10, 2022
Threat Modeling an Application [Moodle] Using STRIDEIn this writeup, my research partner, Chris Bassey and I generated a threat model on an Open Source Learning Management System application…Sep 21, 2021Sep 21, 2021
SIEM MONITORING using WazuhObjective: Carry out an API Attack on an API of your choice then implement a SIEM of your choice to show the logs of all events.Sep 2, 2021Sep 2, 2021
SeriousSam | HiveNightmare — CVE-2021–36934About a week ago , A zero day has been discovered which allows low privileged users to get SYSTEM rights or privilege escalation on…Jul 29, 2021Jul 29, 2021
Wannacry Malware AnalysisIn recent times, malware deployment has increased immensely. So it’s great to analyze them to get a more detailed view about their behavior…May 4, 2021May 4, 2021
Advent of Christmas 2 | 2020 WalkthroughTask 7 [Day 2] Web Exploitation The Elf Strikes Back!Jan 3, 2021Jan 3, 2021