Skip to main content

Posts

Project: Honeypot and Monitoring with Azure Sentinel SIEM
·1561 words·8 mins
Introduction # Honeypots are deceptive tools used in cybersecurity to attract and trap malicious actors. By simulating vulnerabilities, they divert attackers from real assets while gathering valuable intelligence on their tactics and methods. This strategy helps organizations enhance their security posture, understand emerging threats, and develop effective defensive measures against cybercrime. In this particular project we can see the bad actors trying to access our Windows VM through RDP.
Deep Dive into Network Monitoring
·1489 words·7 mins
Network monitoring is essential for ensuring the reliability, security, and performance of computer networks. It involves continuously observing network traffic to detect and respond to anomalies, optimize resource allocation, and maintain uptime.
Which Linux Distro is the best for you?
·1113 words·6 mins
This is a quick little blog about my Linux journey and how you could start yours. I started my Linux journey when I realized how much easier it was to install packages, but the real game-changer came from the significant performance boost. Using VMware Workstation, I could run 3 separate Windows VMs simultaneously on Linux, while Windows struggled with just two, often crashing.
How I Passed the OSCP in Just 6 Months
·2549 words·12 mins
I am a student pursuing a Bachelor’s degree in Computer Science and Engineering and I passed the OSCP just six months into my cybersecurity journey, despite having limited prior experience.