Event Analysis and Logs Parsing with Splunk | TryHackMe Fixit
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
Everything related to CyberSecurity and Penetration Testing
We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one…
We explained the process of installing and configuring Splunk by showing the steps that involve choosing the…
Most Frequenty asked questions on How to Become Red Team Hacker & Penetration Tester answered by experts…
We covered an introduction to Splunk Search Processing Language (SPL) and discussed the basic commandsand various types…
We covered an introduction to logging where we discussed the logic of creating logs and we analyzed…
We covered an introduction to logging where we discussed the logic of creating logs and why we…
We demonstrated the cybersecurity framework ATT&CK and shield for security strategies and active defense. We also covered…
We covered automated and manual methods of scanning and cleaning a WordPress website infected with different types…
We covered examples of analyzing cybersecurity incidents such as Anomalous DNS, phishing attacks and the Log4j vulnerability…
We discussed and introduced TheHive platform which is used as a security incident response platform for collaboration…