
Life as It Is Lately
When life gives you lemons, they say make lemonade. That’s exactly what I’ve been doing for a while now during my break from writing. I’ll skip the sour details and focus on the good lemonade stuff...
When life gives you lemons, they say make lemonade. That’s exactly what I’ve been doing for a while now during my break from writing. I’ll skip the sour details and focus on the good lemonade stuff...
The fun part about solving vulnerable labs, CTF challenges, or even bug bounties is the thrill of bypassing filters and dodging defense mechanisms. It’s an eternal cat-and-mouse game, hackers chasi...
Welcome to the Active Directory Exploitation sections. These sections are particularly aimed to provide students and junior security specialists with a comprehensive overview of common attack vecto...
Suricata as an open-source network threat detection engine stands out for its versatility and power. Primarily known for its use as an IDS/IPS, Suricata also offers a number of features which inclu...
As a security analyst, Windows event logs are among the most valuable sources of information for your daily work. Optimizing the logging of critical activities within an Active Directory environmen...
With a vulnerable Active Directory environment set up, I will proceed to share how to install and configure the ELK Stack as a Security Information and Event Monitoring (SIEM) system. This setup wi...
As part of my 50-BlueTeam-Projects, I’ve revisited the Game of Active Directory (GOAD) by Orange Cyberdefense, now updated to GOAD v3. This upgrade provides an even more robust and flexible platf...
"Many a mickle makes a muckle." A journey of a thousand miles. Hey! My name is Qawam Musiliu and I’m a security analyst, engineer, and even maybe a researcher (my friend told me, “Fake it till yo...