In this article we have been going to install ELK-Stack. The ELK (Elasticsearch, Logstash, and Kibana) stack is a centralized logging solution that provides users…
Clifford Stoll’s book “The Cuckoo’s Egg” tells the exciting true story of his hunt for a hacker who broke into a computer network at the…
In this Article we have been passing through the detailed Attack Life Cycle of APT1 Cyber Espionage and highlighted the main techniques and tools used…
In this article I am going to show you what is WAS EC2 Instances and how to create it on AWS Plateforme. Amazon EC2 or…
In this Article We have been going to Configure VPC Flow Logs to Send Logs to CloudWatch for monitoring network traffic to VPC and Resources.…
In BTJA Course for network analysis we have studied tcpdum and Wireshark to analyze traffic but at the end we have given with scenario to…
My walkthrough of analyzing PCAP 2 of the Wireshark Challenge from Security Blue Team’s Blue Team Junior Analyst Pathway. After analyzing the pcap 2 given…
In this article we have been going to test our Wireshark skill by analyzing a pcap 1 file and will answer the following questions. Which…
Arduino interfacing with DHT11 sensor and LCD This topic shows how to interface Arduino UNO board with DHT11 digital humidity and temperature sensor where the…
Arduino LCD Example This small post shows a simple example of an interfacing of Arduino UNO board with LCD screen. The Arduino can easily control…