In this article we have been going to install ELK-Stack. The ELK (Elasticsearch, Logstash, and Kibana) stack is a centralized logging solution that provides users…
Clifford Stoll’s book “The Cuckoo’s Egg” tells the exciting true story of his hunt for a hacker who broke into a computer network at the…
In this Article we have been passing through the detailed Attack Life Cycle of APT1 Cyber Espionage and highlighted the main techniques and tools used…
In this article I am going to show you what is WAS EC2 Instances and how to create it on AWS Plateforme. Amazon EC2 or…
In this Article We have been going to Configure VPC Flow Logs to Send Logs to CloudWatch for monitoring network traffic to VPC and Resources.…
In BTJA Course for network analysis we have studied tcpdum and Wireshark to analyze traffic but at the end we have given with scenario to…
My walkthrough of analyzing PCAP 2 of the Wireshark Challenge from Security Blue Team’s Blue Team Junior Analyst Pathway. After analyzing the pcap 2 given…
In this article we have been going to test our Wireshark skill by analyzing a pcap 1 file and will answer the following questions. Which…
Networking offers numerous benefits, including career advancement, skill development, and personal growth. It can lead to job opportunities, career advice, and the development of lasting professional relationships. Networking…
Arduino interfacing with DHT11 sensor and LCD This topic shows how to interface Arduino UNO board with DHT11 digital humidity and temperature sensor where the…