
The Start
"Many a mickle makes a muckle." A journey of a thousand miles. Hey! My name is Qawam Musiliu and I’m a security analyst, engineer, and even maybe a researcher (my friend told me, “Fake it till yo...
"Many a mickle makes a muckle." A journey of a thousand miles. Hey! My name is Qawam Musiliu and I’m a security analyst, engineer, and even maybe a researcher (my friend told me, “Fake it till yo...
Welcome to the Active Directory Exploitation sections. These sections are particularly aimed to provide students and junior security specialists with a comprehensive overview of common attack vecto...
Suricata as an open-source network threat detection engine stands out for its versatility and power. Primarily known for its use as an IDS/IPS, Suricata also offers a number of features which inclu...
As a security analyst, Windows event logs are among the most valuable sources of information for your daily work. Optimizing the logging of critical activities within an Active Directory environmen...
With a vulnerable Active Directory environment set up, I will proceed to share how to install and configure the ELK Stack as a Security Information and Event Monitoring (SIEM) system. This setup wi...
As part of my 50-BlueTeam-Projects, I’ve revisited the Game of Active Directory (GOAD) by Orange Cyberdefense, now updated to GOAD v3. This upgrade provides an even more robust and flexible platf...