Investigations can be time-sensitive and complex. Having a set of ready-to-use queries helps me quickly filter through large volumes of data to identify suspicious activities and potential threats. This cheat sheet is meant to...
Category - defense
My OSIR and OSTH journey began on May 12th, when I received the annual OffSec voucher. I had been wanting to dive into OSIR for a while since it’s based on Splunk—a widely used SIEM that I hadn’t yet had the chance to...