Analista de Ciberseguridad · Troubleshooting, evidencias y logs
Posts
- 0x00: Initial Access & Baseline
- 0x01: Fortress Mode
- 0x02: System Awareness
- 0x03: Ops & Automations
- 0x04: Manual Override & Forensic Recovery
- 0x05: Qualcomm MSM8916 & Cellular SIGINT
- 0x06: RTL-SDR Configuration and Use I
- 0x07: REMnux Lab // Network Hardening & Troubleshooting
- 0x08: Process-based Split Tunneling/Namespaces
- 0x09: Wireless Auditing on Raspberry Pi 5
- 0x10: New IoT Attack Vectors
- 0x11: Construction with AI (Antigravity) of the Cyber Radar App
- 0x12: What your neighbors don’t want you to know
- 0x13: Security Assessment & RF Intelligence
- 0x14: Start of a Reticulum Network (RNS)
- 0x15: Reticulum Vs Meshtastic
- 0x16: Vectors in Embedded Systems & RF
- 0x17: Sentinel IoT Node Deployment
- 0x18: Sysinternals - Basic Forensic Analysis of Network Processes and Telemetry
- 0x19: ASEPs Persistence Management and Audit
- 0x20: Remote Administration and Privilege Escalation
- 0x21: File System (I/O) Forensic Analysis
- 0x22: Advanced Telemetry and Process Hashing
- 0x23: Controller Integrity Audit (Ring 0)
- 0x24: Hidden Data Stream Detection (ADS)
- 0x25: Access Control Audit (AccessChk)
- 0x26: Memory Forensic Analysis (Memory Dumping)
- 0x27: Data Sanitization and Anti-Forensics
- 0x28: Adversary Simulation and IoT Audit
- 0x29: WiFi & BLE Spectrum Audit in Large Surfaces
- 0x30: Critical Infrastructure and IoT Convergence Audit
- 0x31: Evolution of Wireless Security Posture
- 0x32: Micro-cut Diagnosis and Hybrid Infrastructure
- 0x33: Latency Telemetry and Systemic Behavior
- 0x34: Analysis of Guest Access Incidents
- 0x35: ISE Deployment Technical Specifications
- 0x36: Hardware Capabilities Inventory
- 0x37: RFID/NFC Access Control Audit
- 0x38: CLI Compatibility Analysis
- 0x39: Why the Blue Team needs the Attacker’s DNA
- 0x40: Passive assessment of high-density RF retail environments
- 0x41: Network Traffic Forensics I
- 0x42: Analysis of VPN Collapse I
- 0x43: Analysis of VPN Collapse II
- 0x44: The Invisible Digital Footprint
- 0x45: Wireshark - The standard network packet analyzer
- 0x46: Gravity SOC - My Security Operations Center
- 0x47: Forensic Analysis of Email Headers
- 0x48: Forensic Analysis of HAR files
- 0x49: Capturing OOK ISM Transmissions
- 0x50: The Security Bunker
- 0x51: DAST AUDIT: Hardening and Validation with OWASP ZAP
- 0x52: PCAP analysis, web shell identification and data exfiltration
- 0x53: Stealc malware analysis: C2, RC4, MITER ATT&CK and evasion techniques
- 0x54: LLMNR/NBT-NS poisoning, credential capture, and SMB analysis
- 0x55: Yellow Cockatoo malware analysis: .NET RAT, C2, persistence and evasion
- 0x56: Memory Forensics - Volatility3
- 0x57: Insider Threat Investigation
- 0x58: MetaMask Kit Analysis
- 0x59: Lateral Movement via SMB
- 0x60: Banking Trojan Analysis
- 0x61: Info Stealer Analysis
- 0x62: Log Analysis - Apache Tomcat Access Logs
- 0x63: Simple Phishing Analysis
- 0x64: Telecom Security - Mobile Protocols (RCS vs SMS)
- 0x65: Log Analysis with BMO IA on Obsidian